Journal: IJAHUC

Volume 22, Issue 4

203 -- 225Anfeng Liu, Yanling Hu, Zhigang Chen. An energy-efficient mobile target detection scheme with adjustable duty cycles in wireless sensor networks
226 -- 235Chow-Sing Lin, Shang-Hsuan Hsu. Effective self-adjustment places of interest discovery in public places
236 -- 248Vanga Odelu, Ashok Kumar Das, Adrijit Goswami. A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
249 -- 264Tzung-Shi Chen, Neng-Chung Wang, Gwo-Jong Yu, Hsin-Ju Chen. A context-aware service framework for mobile ad hoc networks
265 -- 273Dibakar Chakraborty. EstQoS: establishing quality of service in multirate multihop wireless mesh networks through available bandwidth computation and efficient admission control

Volume 22, Issue 3

139 -- 152Fei Ren, Huachun Zhou, Li Yi, Yajuan Qin, Hongke Zhang. HMMCCN: a hierarchical mobility management scheme for content-centric networking
153 -- 163Ruiying Li, Haitao Liao, Xiaoxi Liu, Ning Huang. Lifetime optimisation for linear wireless sensor networks under retransmission
164 -- 173Zhidong He. Extremal optimisation approach to joint routing and scheduling for industrial wireless networks
174 -- 187Zheng Zhang, Zhenbo Li, Jiapin Chen, Shouwei Hu, Wei Wang. Energy-efficient and low-delay scheduling scheme for low power wireless sensor network with real-time data flows
188 -- 202Yaghoub Alizadeh Govarchinghaleh, Masoud Sabaei, Omid Tavallaie. A distributed joint topology control and forwarding protocol in MANETs using game theory

Volume 22, Issue 2

71 -- 83Abolfazl Falahati, Hoda Jannati. Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack
84 -- 95Kuo-Lung Wang, Tsan-Pin Wang, Chien-Chao Tseng. Adaptive RSU re-routing under delay constraint in multi-hop vehicular networks
96 -- 105Zhiting Lin, Xiufang Jiang. Inter-node relationships in short-range mobile social networks
106 -- 119Wen-Lin Yang. Optimal and heuristic algorithms for constructing interference-free multicast trees subject to delay and energy constraints on wireless mesh networks
120 -- 127Xiaobin Tan, Jiangyu Zheng, Cliff Zou, Yukun Niu. Pseudonym-based privacy-preserving scheme for data collection in smart grid
128 -- 137Saifullah Khan, Ki-Il Kim. Simulation-based performance comparison of two routing protocols for aircraft ad-hoc networks

Volume 22, Issue 1

1 -- 13Lin Yao, Chi Lin, Guowei Wu, Taeyoung Jung, Kangbin Yim. An anonymous authentication scheme in data-link layer for VANETs
14 -- 34Parand Akhlaghi, Mehdi Dehghan, Mohammad Mehdi Ebadzadeh. Imprecise query processing in wireless sensor networks: a fuzzy-based approach
35 -- 47Ruifeng Chen, Zhangdui Zhong, Victor C. M. Leung, David G. Michelson. Link connectivity under more realistic channel model for vehicle-to-vehicle communications
48 -- 61Milan Lukic, Ivan Mezei. Localised querying and location update service in wireless sensor and robot networks with arbitrary topology
62 -- 69Ming-Fong Hsu, Tsang-Yi Wang, Chao-Tang Yu, Tsai-Cheng Wu. Sampling design schemes for distributed parameter estimation networks