Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca32.bht:"
@article{DBLP:journals/jnca/Abawajy09, author = {Jemal H. Abawajy}, title = {Adaptive hierarchical scheduling policy for enterprise grid computing systems}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {770--779}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.009}, doi = {10.1016/J.JNCA.2008.04.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbbasovK09, author = {Babek Abbasov and Serdar Korukoglu}, title = {Effective {RED:} An algorithm to improve RED's performance by reducing packet loss rate}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {703--709}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.001}, doi = {10.1016/J.JNCA.2008.07.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AbbasovK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Abd-El-Barr09, author = {Mostafa I. H. Abd{-}El{-}Barr}, title = {Topological network design: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {501--509}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.12.001}, doi = {10.1016/J.JNCA.2008.12.001}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Abd-El-Barr09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Al-KasassbehA09, author = {Mouhammd Al{-}Kasassbeh and Mo Adda}, title = {Network fault detection with Wiener filter-based agent}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {824--833}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.001}, doi = {10.1016/J.JNCA.2009.02.001}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Al-KasassbehA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Al-OqilyK09, author = {Ibrahim Al{-}Oqily and Ahmed Karmouch}, title = {Towards automating overlay network management}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {461--473}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.013}, doi = {10.1016/J.JNCA.2008.02.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Al-OqilyK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlmeidaBDSS09, author = {Francisco Almeida and Vicente Blanco P{\'{e}}rez and Carlos Delgado and Francisco de Sande and Adri{\'{a}}n Santos}, title = {{IDEWEP:} Web service for astronomical parallel image deconvolution}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {293--313}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.005}, doi = {10.1016/J.JNCA.2008.02.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AlmeidaBDSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ArtailSS09, author = {Hassan Artail and Manal Shihab and Ha{\"{\i}}dar Safa}, title = {A distributed mobile database implementation on Pocket {PC} mobile devices communicating over Bluetooth}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {96--115}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.003}, doi = {10.1016/J.JNCA.2008.04.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ArtailSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BayilmisKECO09, author = {C{\"{u}}neyt Bayilmis and Ersoy Kelebekler and Ismail Erturk and Celal Ceken and Ibrahim {\"{O}}z{\c{c}}elik}, title = {Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1210--1218}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.002}, doi = {10.1016/J.JNCA.2009.05.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BayilmisKECO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BosscheVVTDD09, author = {Bruno Van Den Bossche and Bart De Vleeschauwer and Tom Verdickt and Filip De Turck and Bart Dhoedt and Piet Demeester}, title = {Autonomic microcell assignment in massively distributed online virtual environments}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1242--1256}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.04.001}, doi = {10.1016/J.JNCA.2009.04.001}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BosscheVVTDD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BoukasKG09, author = {Lambros Boukas and Georgios Kambourakis and Stefanos Gritzalis}, title = {Pandora: An SMS-oriented m-informational system for educational realms}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {684--702}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.002}, doi = {10.1016/J.JNCA.2008.07.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BoukasKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BourasGT09, author = {Christos Bouras and Eri Giannaka and Thrasyvoulos Tsiatsos}, title = {Identifying best practices for supporting broadband growth: Methodology and analysis}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {795--807}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.003}, doi = {10.1016/J.JNCA.2009.02.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BourasGT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BrobergBT09, author = {James Broberg and Rajkumar Buyya and Zahir Tari}, title = {MetaCDN: Harnessing 'Storage Clouds' for high performance content delivery}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1012--1022}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.004}, doi = {10.1016/J.JNCA.2009.03.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BrobergBT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CaoCZL09, author = {Jian Cao and Jinjun Chen and Haiyan Zhao and Minglu Li}, title = {A policy-based authorization model for workflow-enabled dynamic process management}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {412--422}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.021}, doi = {10.1016/J.JNCA.2008.02.021}, timestamp = {Sun, 28 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CaoCZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CarrollG09, author = {Thomas E. Carroll and Daniel Grosu}, title = {A secure and anonymous voter-controlled election scheme}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {599--606}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.010}, doi = {10.1016/J.JNCA.2008.07.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CarrollG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChandKO09, author = {Satish Chand and Bijendra Kumar and Hari Om}, title = {Video Data Delivery using Slotted Patching}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {660--665}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.004}, doi = {10.1016/J.JNCA.2008.07.004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChandKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChangL09, author = {Chin{-}Chen Chang and Jung{-}San Lee}, title = {Robust t-out-of-n oblivious transfer mechanism based on {CRT}}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {226--235}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.004}, doi = {10.1016/J.JNCA.2008.03.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChenLC09, author = {Yuh{-}Shyan Chen and Yun{-}Wei Lin and Chih{-}Yung Chang}, title = {An overlapping communication protocol using improved time-slot leasing for Bluetooth WPANs}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {273--292}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.007}, doi = {10.1016/J.JNCA.2008.02.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ChenLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChoiLWS09, author = {JungYul Choi and Jaebong Lee and ShinJung Woo and ByoungKwon Shim}, title = {An engineering approach to the design of a BcN control network}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {61--77}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.004}, doi = {10.1016/J.JNCA.2008.04.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChoiLWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CiraciKU09, author = {Selim Ciraci and Ibrahim Korpeoglu and {\"{O}}zg{\"{u}}r Ulusoy}, title = {Reducing query overhead through route learning in unstructured peer-to-peer network}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {550--567}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.09.001}, doi = {10.1016/J.JNCA.2008.09.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CiraciKU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DaviesT09, author = {Pete Davies and Theodore Tryfonas}, title = {A lightweight web-based vulnerability scanner for small-scale computer network security assessment}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {78--95}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.007}, doi = {10.1016/J.JNCA.2008.04.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DaviesT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DemestichasAMT09, author = {Konstantinos P. Demestichas and Evgenia F. Adamopoulou and John G. Markoulidakis and Michael E. Theologou}, title = {Towards Anonymous Mobile Community services}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {116--134}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.002}, doi = {10.1016/J.JNCA.2008.04.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DemestichasAMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Deng09, author = {Yuhui Deng}, title = {Deconstructing Network Attached Storage systems}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1064--1072}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.006}, doi = {10.1016/J.JNCA.2009.02.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Deng09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DenkoSM09, author = {Mieso K. Denko and Elhadi M. Shakshuki and Haroon Malik}, title = {Enhanced cross-layer based middleware for mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {490--499}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.022}, doi = {10.1016/J.JNCA.2008.02.022}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DenkoSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DurresiPB09, author = {Arjan Durresi and Vamsi Paruchuri and Leonard Barolli}, title = {Fast autonomous system traceback}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {448--454}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.019}, doi = {10.1016/J.JNCA.2008.02.019}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DurresiPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FagenCD09, author = {Wade A. Fagen and Jo{\~{a}}o W. Cangussu and Ram Dantu}, title = {A virtual environment for network testing}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {184--214}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.008}, doi = {10.1016/J.JNCA.2008.03.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FagenCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FedakHC09, author = {Gilles Fedak and Haiwu He and Franck Cappello}, title = {BitDew: {A} data management and distribution service with multi-protocol file transfer and metadata abstraction}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {961--975}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.04.002}, doi = {10.1016/J.JNCA.2009.04.002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FedakHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FengLZ09, author = {Li Feng and Zili Li and Yi Zhang}, title = {Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {781--787}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.008}, doi = {10.1016/J.JNCA.2009.02.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FengLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FengWZZ09, author = {Li Feng and Wei Wang and Lina Zhu and Yi Zhang}, title = {Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {721--732}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.06.002}, doi = {10.1016/J.JNCA.2008.06.002}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FengWZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FiroozAPR09, author = {Mohammad Hamed Firooz and Alireza Nasiri Avanaki and Mohammad Reza Pakravan and Keivan Ronasi}, title = {A fast and reliable multi-sender algorithm for peer-to-peer networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {733--740}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.06.004}, doi = {10.1016/J.JNCA.2008.06.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FiroozAPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FortinoM09, author = {Giancarlo Fortino and Carlo Mastroianni}, title = {Next generation content networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {941--942}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.001}, doi = {10.1016/J.JNCA.2009.05.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FortinoM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FortinoMR09, author = {Giancarlo Fortino and Carlo Mastroianni and Wilma Russo}, title = {A hierarchical control protocol for group-oriented playbacks supported by content distribution networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {135--157}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.001}, doi = {10.1016/J.JNCA.2008.04.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FortinoMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuanWZ09, author = {Xiaohong Guan and Wei Wang and Xiangliang Zhang}, title = {Fast intrusion detection based on a non-negative matrix factorization model}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {31--44}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.006}, doi = {10.1016/J.JNCA.2008.04.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuanWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoFLL09, author = {Songtao Guo and Gang Feng and Xiaofeng Liao and Qun Liu}, title = {Novel delay-range-dependent stability analysis of the second-order congestion control algorithm with heterogonous communication delays}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {568--577}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.08.001}, doi = {10.1016/J.JNCA.2008.08.001}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoFLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HaririSPA09, author = {Behnoosh Hariri and Shervin Shirmohammadi and Mohammad Reza Pakravan and Mohammad Hossein Alavi}, title = {An adaptive latency mitigation scheme for massively multiuser virtual environments}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1049--1063}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.002}, doi = {10.1016/J.JNCA.2009.03.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HaririSPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HoangHB09, author = {Xuan Dau Hoang and Jiankun Hu and Peter Bert{\'{o}}k}, title = {A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1219--1228}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.004}, doi = {10.1016/J.JNCA.2009.05.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HoangHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HoltonNYA09, author = {D. R. W. Holton and Ibtehal Talal Nafea and Muhammad Younas and Irfan{-}Ullah Awan}, title = {A class-based scheme for E-commerce web servers: Formal specification and performance evaluation}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {455--460}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.010}, doi = {10.1016/J.JNCA.2008.02.010}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HoltonNYA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HsuCB09, author = {I{-}Ching Hsu and Li{-}Pin Chi and Sheau{-}Shong Bor}, title = {A platform for transcoding heterogeneous markup documents using ontology-based metadata}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {616--629}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.006}, doi = {10.1016/J.JNCA.2008.07.006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HsuCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuH09, author = {Jiankun Hu and Fengling Han}, title = {A pixel-based scrambling scheme for digital medical images protection}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {788--794}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.009}, doi = {10.1016/J.JNCA.2009.02.009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HuH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuangSM09, author = {Tzu{-}Chi Huang and Ce{-}Kuen Shieh and Yu{-}Ben Miao}, title = {Bottleneck Active Node Detouring for capsule-based active network}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {1--30}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.005}, doi = {10.1016/J.JNCA.2008.04.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HuangSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuangZCS09, author = {Tzu{-}Chi Huang and Sherali Zeadally and Naveen K. Chilamkurti and Ce{-}Kuen Shieh}, title = {Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {741--759}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.06.003}, doi = {10.1016/J.JNCA.2008.06.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HuangZCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IlarriMI09, author = {Sergio Ilarri and Eduardo Mena and Arantza Illarramendi}, title = {A system based on mobile agents to test mobile computing applications}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {846--865}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.01.003}, doi = {10.1016/J.JNCA.2009.01.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/IlarriMI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IslamZGX09, author = {Md. Rafiqul Islam and Wanlei Zhou and Minyi Guo and Yang Xiang}, title = {An innovative analyser for multi-classifier e-mail classification based on grey list analysis}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {357--366}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.023}, doi = {10.1016/J.JNCA.2008.02.023}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IslamZGX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JoungY09, author = {Yuh{-}Jzer Joung and Chu{-}Jui Yang}, title = {Email licensing}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {538--549}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.11.003}, doi = {10.1016/J.JNCA.2008.11.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JoungY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanS09, author = {Javed I. Khan and Sajid S. Shaikh}, title = {A phenotype reputation estimation function and its study of resilience to social attacks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {913--924}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.12.003}, doi = {10.1016/J.JNCA.2008.12.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KhanS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LaiLHLC09, author = {Chien{-}Chih Lai and Ren{-}Guey Lee and Chun{-}Chieh Hsiao and Hsin{-}Sheng Liu and Chun{-}Chang Chen}, title = {A H-QoS-demand personalized home physiological monitoring system over a wireless multi-hop relay network for mobile home healthcare applications}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1229--1241}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.007}, doi = {10.1016/J.JNCA.2009.05.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LaiLHLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LeeWN09, author = {Byoung{-}Dai Lee and Jon B. Weissman and Young{-}Kwang Nam}, title = {Adaptive middleware supporting scalable performance for high-end network services}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {510--524}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.11.002}, doi = {10.1016/J.JNCA.2008.11.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LeeWN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Leu09, author = {Fang{-}Yie Leu}, title = {A novel network mobility handoff scheme using {SIP} and {SCTP} for multimedia applications}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1073--1091}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.007}, doi = {10.1016/J.JNCA.2009.02.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Leu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiB09, author = {Bai Li and Lynn Margaret Batten}, title = {Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {377--387}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.017}, doi = {10.1016/J.JNCA.2008.02.017}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiL09, author = {Chunlin Li and Layuan Li}, title = {Three-layer control policy for grid resource management}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {525--537}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.11.001}, doi = {10.1016/J.JNCA.2008.11.001}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiY09, author = {Jiaming Li and Chai Kiat Yeo}, title = {Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {901--912}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.01.001}, doi = {10.1016/J.JNCA.2009.01.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiZL09, author = {Chunlin Li and Jin Xiu Zhong and Layuan Li}, title = {Resource scheduling with conflicting objectives in grid environments: Model and evaluation}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {760--769}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.05.001}, doi = {10.1016/J.JNCA.2008.05.001}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiaoY09, author = {Wen{-}Hwa Liao and Wen{-}Ming Yen}, title = {Power-saving scheduling with a QoS guarantee in a mobile WiMAX system}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1144--1152}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.06.002}, doi = {10.1016/J.JNCA.2009.06.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiaoY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinL09, author = {Shi{-}Jen Lin and Ding{-}Chyu Liu}, title = {An incentive-based electronic payment scheme for digital content transactions over the Internet}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {589--598}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.08.003}, doi = {10.1016/J.JNCA.2008.08.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinLLPL09, author = {Ying{-}Dar Lin and Chun{-}Nan Lu and Yuan{-}Cheng Lai and Wei{-}Hao Peng and Po{-}Ching Lin}, title = {Application classification using packet size distribution and port association}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1023--1030}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.001}, doi = {10.1016/J.JNCA.2009.03.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinLLPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LloretGBD09, author = {Jaime Lloret and Miguel Garcia and Diana Bri and Juan R. Diaz}, title = {Study and performance of a group-based Content Delivery Network}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {991--999}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.008}, doi = {10.1016/J.JNCA.2009.03.008}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LloretGBD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LozanoMOCV09, author = {Miguel Lozano and Pedro Morillo and Juan M. Ordu{\~{n}}a and Vicente Cavero and Guillermo Vigueras}, title = {A new system architecture for crowd simulation}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {474--482}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.011}, doi = {10.1016/J.JNCA.2008.02.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LozanoMOCV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuGY09, author = {Wei{-}Zhou Lu and Wei{-}Xuan Gu and Shun{-}Zheng Yu}, title = {One-way queuing delay measurement and its application on detecting DDoS attack}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {367--376}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.018}, doi = {10.1016/J.JNCA.2008.02.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuGY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuHL09, author = {Eric Jui{-}Lin Lu and Yung{-}Fa Huang and Shu{-}Chiu Lu}, title = {ML-Chord: {A} multi-layered {P2P} resource sharing model}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {578--588}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.08.002}, doi = {10.1016/J.JNCA.2008.08.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MarsonoEG09, author = {Muhammad N. Marsono and M. Watheq El{-}Kharashi and Fayez Gebali}, title = {A spam rejection scheme during {SMTP} sessions based on layer-3 e-mail classification}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {236--257}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.005}, doi = {10.1016/J.JNCA.2008.03.005}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MarsonoEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MartiRMC09, author = {Ramon Mart{\'{\i}} and Sergi Robles and Abraham Mart{\'{\i}}n{-}Campillo and Jordi Cucurull{-}Juan}, title = {Providing early resource allocation during emergencies: The mobile triage tag}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1167--1182}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.006}, doi = {10.1016/J.JNCA.2009.05.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MartiRMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Martinez-OrtizSFF09, author = {Iv{\'{a}}n Mart{\'{\i}}nez{-}Ortiz and Jos{\'{e}} Luis Sierra and Baltasar Fern{\'{a}}ndez{-}Manj{\'{o}}n and Alfredo Fern{\'{a}}ndez{-}Valmayor}, title = {Language engineering techniques for the development of e-learning applications}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1092--1105}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.005}, doi = {10.1016/J.JNCA.2009.02.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Martinez-OrtizSFF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MattsonG09, author = {Robert L. R. Mattson and Somnath Ghosh}, title = {{HTTP-MPLEX:} An enhanced hypertext transfer protocol and its performance evaluation}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {925--939}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.10.001}, doi = {10.1016/J.JNCA.2008.10.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MattsonG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MolinaPEP09, author = {Benjam{\'{\i}}n Molina and Salvatore F. Pileggi and Manuel Esteve and Carlos Enrique Palau}, title = {A negotiation framework for content distribution in mobile transient networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1000--1011}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.007}, doi = {10.1016/J.JNCA.2009.03.007}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MolinaPEP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NoresDABCGRV09, author = {Mart{\'{\i}}n L{\'{o}}pez Nores and Jorge Garc{\'{\i}}a Duque and Jos{\'{e}} Juan Pazos{-}Arias and Yolanda Blanco{-}Fern{\'{a}}ndez and Manuel Ramos Cabrer and Alberto Gil{-}Solla and Rebeca P. D{\'{\i}}az Redondo and Ana Fern{\'{a}}ndez Vilas}, title = {{KEPPAN:} Knowledge exploitation for proactively-planned ad-hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1194--1209}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.003}, doi = {10.1016/J.JNCA.2009.05.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NoresDABCGRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OuHH09, author = {Li Ou and Xubin He and Jizhong Han}, title = {An efficient design for fast memory registration in {RDMA}}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {642--651}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.008}, doi = {10.1016/J.JNCA.2008.07.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/OuHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OzkasapCA09, author = {{\"{O}}znur {\"{O}}zkasap and Mine {\c{C}}aglar and Ali Alagoz}, title = {Principles and performance analysis of SeCond: {A} system for epidemic peer-to-peer content distribution}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {666--683}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.005}, doi = {10.1016/J.JNCA.2008.07.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/OzkasapCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PapagianniTKPV09, author = {Chryssa A. Papagianni and Nikolaos D. Tselikas and Evangelos A. Kosmatos and Stavros Papapanagiotou and Iakovos S. Venieris}, title = {Performance evaluation study for QoS-aware triple play services over entry-level xDSL connections}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {215--225}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.006}, doi = {10.1016/J.JNCA.2008.03.006}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/PapagianniTKPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PathanB09, author = {Mukaddim Pathan and Rajkumar Buyya}, title = {Resource discovery and request-redirection for dynamic load sharing in multi-provider peering content delivery networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {976--990}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.003}, doi = {10.1016/J.JNCA.2009.03.003}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/PathanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QuKSS09, author = {Wenyu Qu and Masaru Kitsuregawa and Hong Shen and Zhiguang Shan}, title = {A novel fault-tolerant execution model by using of mobile agents}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {423--432}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.008}, doi = {10.1016/J.JNCA.2008.02.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QuKSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RaviYS09, author = {Jayashree Ravi and Zhifeng Yu and Weisong Shi}, title = {A survey on dynamic Web content generation and delivery techniques}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {943--960}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.005}, doi = {10.1016/J.JNCA.2009.03.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RaviYS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SahooSC09, author = {Prasan Kumar Sahoo and Jang{-}Ping Sheu and Yu{-}Chia Chang}, title = {Performance evaluation of wireless sensor network with hybrid channel access mechanism}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {878--888}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.01.004}, doi = {10.1016/J.JNCA.2009.01.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SahooSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SalahH09, author = {Khaled Salah and Mohamed Hamawi}, title = {Comparative packet-forwarding measurement of three popular operating systems}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1039--1048}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.006}, doi = {10.1016/J.JNCA.2009.03.006}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SalahH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SamdanisFA09, author = {Konstantinos Samdanis and Vasilis Friderikos and A. Hamid Aghvami}, title = {Autonomic hierarchical reconfiguration for wireless access networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {630--641}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.007}, doi = {10.1016/J.JNCA.2008.07.007}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SamdanisFA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SanchezLRG09, author = {Manuel S{\'{a}}nchez and Gabriel L{\'{o}}pez and {\'{O}}scar C{\'{a}}novas Reverte and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {Performance analysis of a cross-layer {SSO} mechanism for a roaming infrastructure}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {808--823}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.004}, doi = {10.1016/J.JNCA.2009.02.004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SanchezLRG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShihCCL09, author = {Kuei{-}Ping Shih and Hung{-}Chang Chen and Chien{-}Min Chou and Bo{-}Jun Liu}, title = {On target coverage in wireless heterogeneous sensor networks with multiple sensing units}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {866--877}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.01.002}, doi = {10.1016/J.JNCA.2009.01.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ShihCCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SorteFR09, author = {Dario Di Sorte and Mauro Femminella and Gianluca Reali}, title = {QoS-enabled multicast for delivering live events in a Digital Cinema scenario}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {314--344}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.004}, doi = {10.1016/J.JNCA.2008.02.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SorteFR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SuriadiFJ09, author = {Suriadi Suriadi and Ernest Foo and Audun J{\o}sang}, title = {A user-centric federated single sign-on system}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {388--401}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.016}, doi = {10.1016/J.JNCA.2008.02.016}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SuriadiFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TachwaliBR09, author = {Yahia Tachwali and W. Justin Barnes and Hazem H. Refai}, title = {Configurable symbol synchronizers for software-defined radio applications}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {607--615}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.009}, doi = {10.1016/J.JNCA.2008.07.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TachwaliBR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TariqueTAE09, author = {Mohammed Tarique and Kemal E. Tepe and Sasan Adibi and Shervin Erfani}, title = {Survey of multipath routing protocols for mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1125--1143}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.07.002}, doi = {10.1016/J.JNCA.2009.07.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TariqueTAE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TarngCL09, author = {Jenn{-}Hwan Tarng and Bing{-}Wen Chuang and Pei{-}Chen Liu}, title = {A relay node deployment method for disconnected wireless sensor networks: Applied in indoor environments}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {652--659}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.003}, doi = {10.1016/J.JNCA.2008.07.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TarngCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WaluyoTRS09, author = {Agustinus Borgy Waluyo and David Taniar and J. Wenny Rahayu and Bala Srinivasan}, title = {Mobile service oriented architectures for NN-queries}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {434--447}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.014}, doi = {10.1016/J.JNCA.2008.02.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WaluyoTRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangL09, author = {Neng{-}Chung Wang and Chao{-}Yang Lee}, title = {A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1153--1166}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.06.001}, doi = {10.1016/J.JNCA.2009.06.001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangSL09, author = {Hua Wang and Zhao Shi and Shuai Li}, title = {Multicast routing for delay variation bound using a modified ant colony algorithm}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {258--272}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.002}, doi = {10.1016/J.JNCA.2008.03.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangTVG09, author = {Ling Wang and Yahia Tachwali and Pramode K. Verma and Anjan K. Ghosh}, title = {Impact of bounded delay on throughput in multi-hop networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1031--1038}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.03.009}, doi = {10.1016/J.JNCA.2009.03.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangTVG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WatfaMK09, author = {Mohamed Khalil Watfa and Omar Mirza and Jad Kawtharani}, title = {{BARC:} {A} Battery Aware Reliable Clustering algorithm for sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {6}, pages = {1183--1193}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.05.005}, doi = {10.1016/J.JNCA.2009.05.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WatfaMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuCW09, author = {Dan Wu and Chi Hong Cheong and Man Hon Wong}, title = {Supporting asynchronous update for distributed data cubes}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {889--900}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.12.002}, doi = {10.1016/J.JNCA.2008.12.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WuCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuTN09, author = {Di Wu and Ye Tian and Kam{-}Wing Ng}, title = {Resilient and efficient load balancing in distributed hash tables}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {45--60}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.008}, doi = {10.1016/J.JNCA.2008.04.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WuTN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangYC09, author = {Chao{-}Tung Yang and Ming{-}Feng Yang and Wen{-}Chung Chiang}, title = {Enhancement of anticipative recursively adjusting mechanism for redundant parallel file transfer in data grids}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {4}, pages = {834--845}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.002}, doi = {10.1016/J.JNCA.2009.02.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YangYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YounasAY09, author = {Muhammad Younas and Irfan Awan and Laurence Tianruo Yang}, title = {Special issue on service oriented computing and advanced network applications}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {433}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.009}, doi = {10.1016/J.JNCA.2008.02.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YounasAY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YuLZ09, author = {Meng Yu and Peng Liu and Wanyu Zang}, title = {The implementation and evaluation of a recovery system for workflows}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {158--183}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.007}, doi = {10.1016/J.JNCA.2008.03.007}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/YuLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YueW09, author = {Chuan Yue and Haining Wang}, title = {Profit-aware overload protection in E-commerce Web sites}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {347--356}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.020}, doi = {10.1016/J.JNCA.2008.02.020}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YueW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangH09, author = {Zonghua Zhang and Pin{-}Han Ho}, title = {Janus: {A} dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {710--720}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.011}, doi = {10.1016/J.JNCA.2008.07.011}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZhangH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangYMZ09, author = {Yan Zhang and Laurence Tianruo Yang and Jianhua Ma and Jun Zheng}, title = {Quantitative analysis of location management and QoS in wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {483--489}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.012}, doi = {10.1016/J.JNCA.2008.02.012}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangYMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhouLK09, author = {Chenfeng Vincent Zhou and Christopher Leckie and Shanika Karunasekera}, title = {Decentralized multi-dimensional alert correlation for collaborative intrusion detection}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {5}, pages = {1106--1123}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2009.02.010}, doi = {10.1016/J.JNCA.2009.02.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhouLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhouX09, author = {Wanlei Zhou and Yang Xiang}, title = {Network and system security}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {345--346}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.06.001}, doi = {10.1016/J.JNCA.2008.06.001}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZhouX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZouHJC09, author = {Deqing Zou and Ligang He and Hai Jin and Xueguang Chen}, title = {{CRBAC:} Imposing multi-grained constraints on the {RBAC} model in the multi-application environment}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {402--411}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.015}, doi = {10.1016/J.JNCA.2008.02.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZouHJC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.