- Isabel de la Torre Díez, Saúl Álvaro-Muñoz, Miguel López Coronado, Joel J. P. C. Rodrigues:
Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT. J. Netw. Comput. Appl. 36(1): 255-261 (2013) - Christophe Dumez, Mohamed Bakhouya, Jaafar Gaber, Maxime Wack, Pascal Lorenz:
Model-driven approach supporting formal verification for web service composition protocols. J. Netw. Comput. Appl. 36(4): 1102-1115 (2013) - El-Sayed M. El-Alfy, Mujahid N. Syed, Shokri Z. Selim:
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks. J. Netw. Comput. Appl. 36(4): 1196-1207 (2013) - Christos Emmanouilidis, Remous-Aris Koutsiamanis, Aimilia Tasidou:
Mobile guides: Taxonomy of architectures, context awareness, technologies and applications. J. Netw. Comput. Appl. 36(1): 103-125 (2013) - Enver Ever, Orhan Gemikonakli, Altan Koçyigit, Eser Gemikonakli:
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues. J. Netw. Comput. Appl. 36(2): 908-926 (2013) - Jeroen Famaey, Frédéric Iterbeke, Tim Wauters, Filip De Turck:
Towards a predictive cache replacement strategy for multimedia content. J. Netw. Comput. Appl. 36(1): 219-227 (2013) - António Fonseca, Teresa Maria Vazão:
Applicability of position-based routing for VANET in highways and urban environment. J. Netw. Comput. Appl. 36(3): 961-973 (2013) - Leijie Fu, Pingyu Jiang, Wei Cao:
Modeling and performance analysis of product development process network. J. Netw. Comput. Appl. 36(6): 1489-1502 (2013) - Jesús Gallardo, Ana I. Molina, Crescencio Bravo, Miguel A. Redondo:
A model-driven and task-oriented method for the development of collaborative systems. J. Netw. Comput. Appl. 36(6): 1551-1565 (2013) - Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juan Hernández-Serrano, Juanjo Alins:
COACH: COllaborative certificate stAtus CHecking mechanism for VANETs. J. Netw. Comput. Appl. 36(5): 1337-1351 (2013) - Geetha Dundesh Devanagavi, N. Nalini, Rajashekhar C. Biradar:
Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. J. Netw. Comput. Appl. 36(4): 1174-1185 (2013) - Dujuan Gu, Xiaohan Liu, Gang Qin, Shuangjian Yan, Ze Luo, Baoping Yan:
VNET6: IPv6 virtual network for the collaboration between applications and networks. J. Netw. Comput. Appl. 36(6): 1579-1588 (2013) - Bin Guo, Daqing Zhang, Zhu Wang, Zhiwen Yu, Xingshe Zhou:
Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. J. Netw. Comput. Appl. 36(6): 1531-1539 (2013) - Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal, Henry L. Owen:
Wireless sensor networks for rehabilitation applications: Challenges and opportunities. J. Netw. Comput. Appl. 36(1): 1-15 (2013) - Ammar Haider, Iqbal Gondal, Joarder Kamruzzaman:
Social-connectivity-aware vertical handover for heterogeneous wireless networks. J. Netw. Comput. Appl. 36(4): 1131-1139 (2013) - Seung-Wan Han, In-Seon Jeong, Seung-Ho Kang:
Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks. J. Netw. Comput. Appl. 36(1): 156-166 (2013) - Md. Mahedi Hassan, Poo Kuan Hoong:
Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain. J. Netw. Comput. Appl. 36(1): 66-76 (2013) - Xiaobing He, Michael Niedermeier, Hermann de Meer:
Dynamic key management in wireless sensor networks: A survey. J. Netw. Comput. Appl. 36(2): 611-622 (2013) - Mohsen Hooshmand, S. Mohamad R. Soroushmehr, Pejman Khadivi, Shadrokh Samavi, Shahram Shirani:
Visual sensor network lifetime maximization by prioritized scheduling of nodes. J. Netw. Comput. Appl. 36(1): 409-419 (2013) - Weigang Hou, Lei Guo, Xiaoxue Gong:
Survivable power efficiency oriented integrated grooming in green networks. J. Netw. Comput. Appl. 36(1): 420-428 (2013) - Wu-Hsiao Hsu, Yuh-Pyng Shieh:
Virtual network mapping algorithm in the cloud infrastructure. J. Netw. Comput. Appl. 36(6): 1724-1734 (2013) - Kun Huang, Gaogang Xie, Rui Li, Shuai Xiong:
Fast and deterministic hash table lookup using discriminative bloom filters. J. Netw. Comput. Appl. 36(2): 657-666 (2013) - María-Blanca Ibáñez-Espiga, José Jesús García Rueda, David Maroto, Carlos Delgado Kloos:
Collaborative learning in multi-user virtual environments. J. Netw. Comput. Appl. 36(6): 1566-1576 (2013) - Rahat Iqbal, Nazaraf Shah, Anne E. James, Tomasz Cichowicz:
Integration, optimization and usability of enterprise applications. J. Netw. Comput. Appl. 36(6): 1480-1488 (2013) - Md. Rafiqul Islam, Jemal H. Abawajy:
A multi-tier phishing detection and filtering approach. J. Netw. Comput. Appl. 36(1): 324-335 (2013) - Md. Rafiqul Islam, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2): 646-656 (2013) - Shahram Jamali, Seyyed Nasser Seyyed Hashemi, Amir-Masoud Eftekhari-Moghadam:
On the use of a full information feedback to stabilize RED. J. Netw. Comput. Appl. 36(2): 858-869 (2013) - Pekka Jäppinen, Renata Guarneri, Luís M. Correia:
An applications perspective into the Future Internet. J. Netw. Comput. Appl. 36(1): 249-254 (2013) - Jian Jiang, Wei Li, Junzhou Luo, Jing Tan:
A network accountability based verification mechanism for detecting inter-domain routing path inconsistency. J. Netw. Comput. Appl. 36(6): 1671-1683 (2013) - Md. Humayun Kabir, Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman:
Efficient route optimization scheme for nested-NEMO. J. Netw. Comput. Appl. 36(3): 1039-1049 (2013)