- Mohammad Masdari, Sadegh Mohammadzadeh Bazarchi, Moazam Bidaki
:
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks. J. Netw. Comput. Appl. 36(4): 1243-1260 (2013) - Nitin Maslekar, Joseph Mouzna, Mounir Boussedjra, Houda Labiod:
CATS: An adaptive traffic signal system based on car-to-car communication. J. Netw. Comput. Appl. 36(5): 1308-1315 (2013) - Fadoua Mhiri, Kaouthar Sethom, Ridha Bouallegue:
A survey on interference management techniques in femtocell self-organizing networks. J. Netw. Comput. Appl. 36(1): 58-65 (2013) - Chirag Modi
, Dhiren R. Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan:
A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1): 42-57 (2013) - Nader Mohamed, Jameela Al-Jaroodi, Abdulla Eid:
A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud. J. Netw. Comput. Appl. 36(4): 1116-1130 (2013) - Ahmed Hassan Mohammed, Bin Dai, Benxiong Huang, Muhammad Azhar Iqbal, Guan Xu, Peng Qin, Shui Yu
:
A survey and tutorial of wireless relay network protocols based on network coding. J. Netw. Comput. Appl. 36(2): 593-610 (2013) - Rajashree Nair, Ben Soh, Naveen K. Chilamkurti, Jong Hyuk Park:
Structure-free message aggregation and routing in traffic information system (SMART). J. Netw. Comput. Appl. 36(3): 974-980 (2013) - Laisen Nie, Dingde Jiang, Lei Guo:
A power laws-based reconstruction approach to end-to-end network traffic. J. Netw. Comput. Appl. 36(2): 898-907 (2013) - Kashif Nisar
, Angela Amphawan, Suhaidi Hassan
, Nurul I. Sarkar
:
A comprehensive survey on scheduler for VoIP over WLAN. J. Netw. Comput. Appl. 36(2): 933-948 (2013) - Yuanyuan Pan, Jianqing Li
:
Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J. Netw. Comput. Appl. 36(6): 1599-1609 (2013) - Rodrigo Palucci Pantoni, Dennis Brandão
:
A gradient based routing scheme for street lighting wireless sensor networks. J. Netw. Comput. Appl. 36(1): 77-90 (2013) - Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari
, Joaquim Celestino Júnior:
An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. 36(1): 25-41 (2013) - I-Hsuan Peng, Yen-Wen Chen:
Energy consumption bounds analysis and its applications for grid based wireless sensor networks. J. Netw. Comput. Appl. 36(1): 444-451 (2013) - Yuhuai Peng, Yao Yu, Lei Guo, Dingde Jiang, Qiming Gai:
An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks. J. Netw. Comput. Appl. 36(2): 843-857 (2013) - Shams Qazi, Raad Raad, Yi Mu, Willy Susilo
:
Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2): 582-592 (2013) - Anbazhagan Rajesh, Rangaswamy Nakkeeran:
Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks. J. Netw. Comput. Appl. 36(6): 1589-1598 (2013) - Sulma Rashid, Abdul Hanan Abdullah, Qaisar Ayub, Mohd Soperi Mohd Zahid
:
Dynamic Prediction based Multi Queue (DPMQ) drop policy for probabilistic routing protocols of delay tolerant network. J. Netw. Comput. Appl. 36(5): 1395-1402 (2013) - A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar
:
Wireless Sensor Network transport protocol: A critical review. J. Netw. Comput. Appl. 36(1): 134-146 (2013) - Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:
Guest Editorial on Vehicular Networking Protocols. J. Netw. Comput. Appl. 36(3): 959-960 (2013) - Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:
Guest editorial on vehicular communications and applications. J. Netw. Comput. Appl. 36(5): 1273-1274 (2013) - Domenico Rosaci
, Giuseppe M. L. Sarnè:
Cloning mechanisms to improve agent performances. J. Netw. Comput. Appl. 36(1): 402-408 (2013) - Anwar Saif, Mohamed Othman:
SRA-MSDU: Enhanced A-MSDU frame aggregation with selective retransmission in 802.11n wireless networks. J. Netw. Comput. Appl. 36(4): 1219-1229 (2013) - Khaled Salah
, Mohamed Hamawi:
Performance of IP-forwarding of Linux hosts with multiple network interfaces. J. Netw. Comput. Appl. 36(1): 452-465 (2013) - Haythem Bany Salameh
, Osamah S. Badarneh:
Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks. J. Netw. Comput. Appl. 36(1): 523-532 (2013) - Mojtaba Seyedzadegan, Mohamed Othman, Borhanuddin Mohd Ali, Shamala Subramaniam:
Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks. J. Netw. Comput. Appl. 36(6): 1705-1723 (2013) - Weiming Shen
, Weidong Li:
Collaboration technologies and applications. J. Netw. Comput. Appl. 36(6): 1403-1404 (2013) - Weiming Shen
, Weidong Li:
Collaboration computing technologies and applications. J. Netw. Comput. Appl. 36(6): 1577-1578 (2013) - Jiancheng Shi, Jianhua Liu, Ruxin Ning, Weiwei Hou:
A collisions evaluation method in virtual environment for collaborativeassembly. J. Netw. Comput. Appl. 36(6): 1523-1530 (2013) - Diego Carvalho Soares, Flávia Maria Santoro, Fernanda Araújo Baião
:
Discovering collaborative knowledge-intensive processes through e-mail mining. J. Netw. Comput. Appl. 36(6): 1451-1465 (2013) - Navid Tadayon, Sasan Khoshroo, Elaheh Askari, Honggang Wang
, Howard Michel:
Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis. J. Netw. Comput. Appl. 36(3): 1008-1017 (2013)