Search dblp for Publications

export results for "toc:db/journals/cn/cn133.bht:"

 download as .bib file

@article{DBLP:journals/cn/ArghavaniAAC18,
  author       = {Abbas Arghavani and
                  Mahdi Arghavani and
                  Mahmood Ahmadi and
                  Paul Crane},
  title        = {Attacker-Manager Game Tree {(AMGT):} {A} new framework for visualizing
                  and analysing the interactions between attacker and network security
                  manager},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {42--58},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.013},
  doi          = {10.1016/J.COMNET.2018.01.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ArghavaniAAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AyadIKH18,
  author       = {Ibrahim Ayad and
                  Youngbin Im and
                  Eric Keller and
                  Sangtae Ha},
  title        = {A Practical Evaluation of Rate Adaptation Algorithms in HTTP-based
                  Adaptive Streaming},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {90--103},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.019},
  doi          = {10.1016/J.COMNET.2018.01.019},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AyadIKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BelguithKLJA18,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Abderrazak Jemai and
                  Rabah Attia},
  title        = {{PHOABE:} Securely outsourcing multi-authority attribute based encryption
                  with policy hidden for cloud assisted IoT},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {141--156},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.036},
  doi          = {10.1016/J.COMNET.2018.01.036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BelguithKLJA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BoryloDW18,
  author       = {Piotr Borylo and
                  Jerzy Domzal and
                  Robert W{\'{o}}jcik},
  title        = {Survivable automatic hidden bypasses in Software-Defined Networks},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {73--89},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.022},
  doi          = {10.1016/J.COMNET.2018.01.022},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BoryloDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Carmona-Murillo18,
  author       = {Javier Carmona{-}Murillo and
                  Vasilis Friderikos and
                  Jos{\'{e}} Luis Gonz{\'{a}}lez S{\'{a}}nchez},
  title        = {A hybrid {DMM} solution and trade-off analysis for future wireless
                  networks},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {17--32},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.030},
  doi          = {10.1016/J.COMNET.2018.01.030},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Carmona-Murillo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChenWZSWXL18,
  author       = {Huan Chen and
                  Xiong Wang and
                  Yangming Zhao and
                  Tongyu Song and
                  Yang Wang and
                  Shizhong Xu and
                  Lemin Li},
  title        = {{MOSC:} a method to assign the outsourcing of service function chain
                  across multiple clouds},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {166--182},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.020},
  doi          = {10.1016/J.COMNET.2018.01.020},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChenWZSWXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CuiDLYN18,
  author       = {Hui Cui and
                  Robert H. Deng and
                  Junzuo Lai and
                  Xun Yi and
                  Surya Nepal},
  title        = {An efficient and expressive ciphertext-policy attribute-based encryption
                  scheme with partially hidden access structures, revisited},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {157--165},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.034},
  doi          = {10.1016/J.COMNET.2018.01.034},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/CuiDLYN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GuptaHMCTM18,
  author       = {Abhishek Gupta and
                  M. Farhan Habib and
                  Uttam Mandal and
                  Pulak Chowdhury and
                  Massimo Tornatore and
                  Biswanath Mukherjee},
  title        = {On service-chaining strategies using Virtual Network Functions in
                  operator networks},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.028},
  doi          = {10.1016/J.COMNET.2018.01.028},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/GuptaHMCTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiHXH18,
  author       = {Wei Li and
                  Changxin Huang and
                  Chao Xiao and
                  Songchen Han},
  title        = {A heading adjustment method in wireless directional sensor networks},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {33--41},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.031},
  doi          = {10.1016/J.COMNET.2018.01.031},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LiHXH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MoazzeniKMC18,
  author       = {Shadi Moazzeni and
                  Mohammad Reza Khayyambashi and
                  Naser Movahhedinia and
                  Franco Callegati},
  title        = {On reliability improvement of Software-Defined Networks},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {195--211},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.023},
  doi          = {10.1016/J.COMNET.2018.01.023},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MoazzeniKMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ShenLYWDH18,
  author       = {Yiran Shen and
                  Chengwen Luo and
                  Dan Yin and
                  Hongkai Wen and
                  Daniela Rus and
                  Wen Hu},
  title        = {Privacy-preserving sparse representation classification in cloud-enabled
                  mobile applications},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {59--72},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.035},
  doi          = {10.1016/J.COMNET.2018.01.035},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ShenLYWDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangA18,
  author       = {Jessie Hui Wang and
                  Changqing An},
  title        = {A study on geographic properties of internet routing},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {183--194},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.032},
  doi          = {10.1016/J.COMNET.2018.01.032},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangZBCCTX18,
  author       = {Tian Wang and
                  Jiandian Zeng and
                  Md. Zakirul Alam Bhuiyan and
                  Yonghong Chen and
                  Yiqiao Cai and
                  Hui Tian and
                  Mande Xie},
  title        = {Energy-efficient relay tracking with multiple mobile camera sensors},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {130--140},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.002},
  doi          = {10.1016/J.COMNET.2018.01.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangZBCCTX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/XuGZ18,
  author       = {Jun Xu and
                  Chengcheng Guo and
                  Hao Zhang},
  title        = {Joint channel allocation and power control based on {PSO} for cellular
                  networks with {D2D} communications},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {104--119},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.017},
  doi          = {10.1016/J.COMNET.2018.01.017},
  timestamp    = {Sat, 01 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/XuGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/XuMX18,
  author       = {Chaonong Xu and
                  Kaichi Ma and
                  Yongjun Xu},
  title        = {Complexity of minimum uplink scheduling in backbone-assisted successive
                  interference cancellation-based wireless networks},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {120--129},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.014},
  doi          = {10.1016/J.COMNET.2018.01.014},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/XuMX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YiWLDH18,
  author       = {Bo Yi and
                  Xingwei Wang and
                  Keqin Li and
                  Sajal K. Das and
                  Min Huang},
  title        = {A comprehensive survey of Network Function Virtualization},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {212--262},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.021},
  doi          = {10.1016/J.COMNET.2018.01.021},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YiWLDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics