default search action
Journal of Networks, Volume 3
Volume 3, Number 1, January 2008
- Maarten Ditzel, Caspar Lageweg, Johan Janssen, Arne Theil:
Multi-target Data Aggregation and Tracking in Wireless Sensor Networks. 1-9 - Szabolcs Nováczki, László Bokor, Gábor Jeney, Sándor Imre:
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol. 10-24 - Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
Fraudulent Internet Banking Payments Prevention using Dynamic Key. 25-34 - J. Javier Samper, F. Javier Adell, Leo van den Berg, Juan José Martínez-Durá:
Improving Semantic Web Service Discovery. 35-42 - Hogil Kim, Eun Jung Kim, Ki Hwan Yum:
ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks. 43-52 - Cholatip Yawut, Béatrice Paillassa, Riadh Dhaou:
Mobility Metrics Evaluation for Self-Adaptive Protocols. 53-64 - David Boyle, Thomas Newe:
Securing Wireless Sensor Networks: Security Architectures. 65-77 - Donggeon Noh, Ikjune Yoon, Heonshik Shin:
Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs. 78-85
Volume 3, Number 2, February 2008
- Wei-Kuo Chiang, Hsin-Fu Huang:
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN. 1-8 - Fredrik Manne, Qin Xin:
Time Efficient Radio Broadcasting in Planar Graphs. 9-16 - Natarajan Meghanathan:
Exploring the Stability-Energy Consumption-Delay-Network Lifetime Tradeoff of Mobile Ad Hoc Network Routing Protocols. 17-28 - Rui Miguel Soares Silva, Nuno Sidónio Andrade Pereira, Mário Serafim Nunes:
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks. 29-37 - António Luís Lopes, Luís Miguel Botelho:
Improving Multi-Agent Based Resource Coordination in Peer-to-Peer Networks. 38-47 - Sen Xu, Chin-Tser Huang, Manton M. Matthews:
Secure Multicast in WiMAX. 48-57 - Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladhake, Rajesh D. Thakare:
Micro-controller based Remote Monitoring using Mobile through Spoken Commands. 58-63 - Bent Guldbjerg Christensen, Mads Darø Kristensen, Frank Allan Hansen, Niels Olof Bouvin:
Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers. 64-71
Volume 3, Number 3, March 2008
- Vit Novotny, Dan Komosny:
Large-Scale RTCP Feedback Optimization. 1-10 - Sanjaya Gajurel, Behnam Malakooti:
Re-Configurable Antenna & Transmission Power for Location Aware MANET Routing with Multiple Objective Optimization. 11-18 - Jorge Sá Silva, Tiago Camilo, Pedro Pinto, Ricardo Ruivo, André Rodrigues, Filipa Gaudêncio, Fernando Boavida:
Multicast and IP Multicast Support in Wireless Sensor Networks. 19-26 - Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean Lee:
Optimization of Job Schedule Model Based on Grid Environment. 27-33 - Fang Jing, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:
Adaptive Route Selection Policy Based on Back Propagation Neural Networks. 34-41 - J. Amutharaj, S. Radhakrishnan:
Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution. 42-48 - Mads Darø Kristensen, Niels Olof Bouvin:
Energy Efficient MANET Routing Using a Combination of Span and BECA/AFECA. 49-56 - Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems. 57-70
Volume 3, Number 4, April 2008
- Serena Pastore:
The Necessity of Semantic Technologies in Grid Discovery. 1-9 - Ichiro Satoh:
A Spatial Communication Model for Ubiquitous Computing Services. 10-20 - Christine Louberry, Philippe Roose, Marc Dalmau:
Heterogeneous Component Interactions: Sensors Integration Into Multimedia Applications. 21-30 - Shahab Kamali, Jaroslav Opatrny:
A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks. 31-41 - Glenn Platt, Joshua Wall, Philip Valencia, John K. Ward:
The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources. 42-50 - Seung S. Yang, Yoon G. Kim, Hongsik Choi:
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks. 51-63 - Sanjeeb Nanda, Narsingh Deo:
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction. 64-71
Volume 3, Number 5, May 2008
- Stefan Lindskog, Zoltán Faigl, Anna Brunström:
A Conceptual Model for Analysis and Design of Tunable Security Services. 1-12 - Latha Tamilselvan, V. Sankaranarayanan:
Prevention of Co-operative Black Hole Attack in MANET. 13-20 - Poondi Srinivasan Pandian, Kadavath Peedikayil Safeer, Pragati Gupta, Doddamallur Thirumala Iyengar Shakunthala, B. S. Sundersheshu, Vinod Chidambar Padaki:
Wireless Sensor Network for Wearable Physiological Monitoring. 21-29 - Ivan Marsá-Maestre, Miguel A. López-Carmona, Juan R. Velasco, Andrés Navarro:
Mobile Agents for Service Personalization in Smart Environments. 30-41 - Onyeka Ezenwoye, Seyed Masoud Sadjadi:
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services. 42-53 - Davar Pishva, G. G. D. Nishantha:
Smart Classrooms for Distance Education and their Adoption to Multiple Classroom Architecture. 54-64 - Takaaki Ishida, Keijiro Ehara, Seiichiro Toda, Yasuhiro Ohara, Masayoshi Imaike, Jun Murai:
Avoidance Mechanism of Redundant Transmissions in Content Cruising System. 65-77
Volume 3, Number 6, June 2008
- Ali E. Helvaci, Coskun Cetinkaya, Mehmet Bayram Yildirim:
Using Rerouting to Improve Aggregate Based Resource Allocation. 1-12 - Kalvinder Singh, Vallipuram Muthukkumarasamy:
Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks. 13-28 - Maria Calle, Joseph Kabara:
MAC Protocols for GSP in Wireless Sensor Networks. 29-35 - Li Jun Zhang, Samuel Pierre:
Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks. 36-43 - Francesca Cuomo:
An Architectural Model to Provide QoS in a Home Network and its Evaluation in a Real Testbed. 44-53 - Gilles Guette:
Key Revocation System for DNSSEC. 54-61 - E. Baburaj, V. Vasudevan:
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs. 62-68 - Damayanti Datta, Sukhamay Kundu:
An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks. 69-81 - Mona Holsve Ofigsbø, Anne Marie Hegland, Pål Spilling, Øivind Kure, Leif Nilsen:
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme. 82-92
Volume 3, Number 7, July 2008
- Qiang Yan, Xiaoyan Huang:
User Behavior and IM Topology Analysis. 1-7 - Takashi Kunifuji, Jun Nishiyama, Hiroyuki Sugahara, Tetsuya Okada, Yamato Fukuta, Masayuki Matsumoto:
A Railway Signal Control System by Optical LAN and Design Simplification. 8-15 - Chia-Sheng Tsai, Wun-Kai Du:
Enhancement of Delivery of Warning Messages for Mobile Networks. 16-25 - Shinako Matsuyama, Takao Terano:
Analyzing the ENRON Communication Network Using Agent-Based Simulation. 26-33 - Hiraku Okada, Hitoshi Imai, Takaya Yamazato, Masaaki Katayama, Kenichi Mase:
A Route Establishment Scheme for Multi-route Coding in Multihop Cellular Networks. 34-40 - Konstantinos Konstantinou, Muhammad Ali Imran, Costas Tzaras:
Analysing a Multi-hop UMTS over Multiple Frequency Schemes and an Urban Environment. 41-48 - Kent A. Chamberlin, Benjamin McMahon, Scott Valcourt:
Datacasting In The Mobile Environment. 49-55 - Ariton E. Xhafa, Anuj Batra, Artur Zaks:
On the 20/40 MHz Coexistence of Overlapping BSSs in WLANs. 56-63 - Valeria Loscrì:
On the Interaction Between Multiple Paths and Wireless Mesh Networks Scheduler Approaches. 64-77
Volume 3, Numbers 8, November 2008
- George J. Sun:
Introducing the New Editor-in-Chief of the Journal of Networks. 1 - Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL. 2-15 - Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murata:
Quality-Aware Cooperative Proxy Caching for Video Streaming Services. 16-25 - Lichun Bao, J. J. Garcia-Luna-Aceves:
Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks. 26-34 - Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi:
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks. 35-44 - Ayman Elnaggar, Mokhtar Aboelaze, Maan Musleh:
A Call Admission Control Protocol for Multimedia Cellular Networks. 45-54 - Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Heterogeneous Security Policy Validation: From Formal to Executable Specifications. 55-69 - Lionel Reyero, Gilles Y. Delisle:
A Pervasive Indoor-Outdoor Positioning System. 70-83
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.