- Minwoo Kim, Karam Park, Won Woo Ro:
Benefits of using parallelized non-progressive network coding. J. Netw. Comput. Appl. 36(1): 293-305 (2013) - Mathias Kretschmer, Philipp Batroff, George Ghinea
:
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies. J. Netw. Comput. Appl. 36(2): 698-710 (2013) - Mahesh Kumar, Shishir Kumar:
AGRIB-BHF: A sustainable and fault tolerant aggregation. J. Netw. Comput. Appl. 36(2): 881-886 (2013) - Saleem-Ullah Lar, Xiaofeng Liao:
An initiative for a classified bibliography on TCP/IP congestion control. J. Netw. Comput. Appl. 36(1): 126-133 (2013) - Steven Latré
, Jeroen Famaey
, John Strassner, Filip De Turck
:
Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation. J. Netw. Comput. Appl. 36(6): 1405-1417 (2013) - Chao-Yang Lee, Liang-Cheng Shiu, Fu-Tian Lin, Chu-Sing Yang:
Distributed topology control algorithm on broadcasting in wireless sensor network. J. Netw. Comput. Appl. 36(4): 1186-1195 (2013) - Li Ho Leung, Vincent T. Y. Ng
:
Discovering associations between news and contents in social network sites with the D-Miner service framework. J. Netw. Comput. Appl. 36(6): 1651-1659 (2013) - Xiong Li
, Jianwei Niu, Muhammad Khurram Khan
, Junguo Liao:
An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5): 1365-1371 (2013) - Bingdong Li, Jeff Springer, George Bebis, Mehmet Hadi Gunes:
A survey of network flow applications. J. Netw. Comput. Appl. 36(2): 567-581 (2013) - Mingfu Li
, Yueh-Lin Wu, Chia-Rong Chang:
Available bandwidth estimation for the network paths with multiple tight links and bursty traffic. J. Netw. Comput. Appl. 36(1): 353-367 (2013) - Wenfeng Li, Ye Zhong, Xun Wang, Yulian Cao
:
Resource virtualization and service selection in cloud logistics. J. Netw. Comput. Appl. 36(6): 1696-1704 (2013) - Kuang-Yow Lian
, Sung-Jung Hsiao, Wen-Tsai Sung:
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks. J. Netw. Comput. Appl. 36(2): 756-767 (2013) - Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung:
Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 36(1): 16-24 (2013) - Kai Lin:
Research on adaptive target tracking in vehicle sensor networks. J. Netw. Comput. Appl. 36(5): 1316-1323 (2013) - Ying-Dar Lin, Cheng-Yuan Ho, Yuan-Cheng Lai, Tzu-Hsiung Du, Shun-Lee Chang:
Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems. J. Netw. Comput. Appl. 36(4): 1208-1218 (2013) - Po-Ching Lin, Jia-Hau Lee:
Re-examining the performance bottleneck in a NIDS with detailed profiling. J. Netw. Comput. Appl. 36(2): 768-780 (2013) - Yazhi Liu, Jianwei Niu, Jian Ma, Lei Shu
, Takahiro Hara, Wendong Wang:
The insights of message delivery delay in VANETs with a bidirectional traffic model. J. Netw. Comput. Appl. 36(5): 1287-1294 (2013) - Yejun Liu, Qingyang Song, Rui Ma, Bing Li, Bo Gong:
Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network. J. Netw. Comput. Appl. 36(3): 1057-1069 (2013) - Yanheng Liu, Longxiang Suo, Dayang Sun, Aimin Wang:
A virtual square grid-based coverage algorithm of redundant node for wireless sensor network. J. Netw. Comput. Appl. 36(2): 811-817 (2013) - Jaime Lloret, Alejandro Canovas, Angel Catala, Miguel Garcia
:
Group-based protocol and mobility model for VANETs to offer internet access. J. Netw. Comput. Appl. 36(3): 1027-1038 (2013) - Mary Looney, Oliver Gough:
A provision aware proportional fair sharing three colour marker. J. Netw. Comput. Appl. 36(1): 476-483 (2013) - Ta-Ping Lu, Amy J. C. Trappey, Yi-Kuang Chen, Yu-Da Chang:
Collaborative design and analysis of supply chain network management key processes model. J. Netw. Comput. Appl. 36(6): 1503-1511 (2013) - Shiliang Luo, Xu Lu, Lianglun Cheng:
TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of Things. J. Netw. Comput. Appl. 36(2): 738-743 (2013) - Jian-Zhen Luo, Shun-Zheng Yu:
Position-based automatic reverse engineering of network protocols. J. Netw. Comput. Appl. 36(3): 1070-1077 (2013) - Hai Van Luu, Xueyan Tang:
Constructing rings overlay for robust data collection in wireless sensor networks. J. Netw. Comput. Appl. 36(5): 1372-1386 (2013) - Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang:
An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36(1): 498-503 (2013) - Ebrahim Mahdipour, Amir Masoud Rahmani
, Saeed Setayeshi
:
Importance sampling for Jackson networks with customer impatience until the end of service. J. Netw. Comput. Appl. 36(4): 1091-1101 (2013) - Najme Mansouri, Gholamhosein Dastghaibyfard, Ehsan Mansouri:
Combination of data replication and scheduling algorithm for improving data availability in Data Grids. J. Netw. Comput. Appl. 36(2): 711-722 (2013) - Abraham Martín-Campillo, Jon Crowcroft, Eiko Yoneki, Ramon Martí
:
Evaluating opportunistic networks in disaster scenarios. J. Netw. Comput. Appl. 36(2): 870-880 (2013) - Damià Castellà Martínez, Francesc Giné
, Francesc Solsona
, Josep L. Lérida
:
Analyzing locality over a P2P computing architecture. J. Netw. Comput. Appl. 36(6): 1610-1619 (2013)