Journal: IJICT

Volume 12, Issue 3/4

232 -- 245Aris M. Ouksel, Doug Lundquist. A hybrid ad hoc networking protocol for disaster recovery resource management
246 -- 270Mohamed Hefeida, Ashfaq A. Khokhar. Medium access control in wireless sensor networks: a survey
271 -- 298Bahia Zebbane, Manel Chenait, Chafika Benzaid, Nadjib Badache. RTCP: a redundancy aware topology control protocol for wireless sensor networks
299 -- 318Adnan Fida, Nor Tuah Jaidi, Trung Dung Ngo. Coordinated route reconfiguration for throughput optimisation under Rician fading channel
319 -- 344Nawel Bendimerad, Kechar Bouabdellah. Coverage enhancement with occlusion avoidance in networked rotational video sensors for post-disaster management
345 -- 363Tiago Marino, Maria Luiza Machado Campos, Marcos R. S. Borges, John G. Breslin, Maciej Dabrowski. Architecture for gathering and integrating collaborative information for decision support in emergency situations
364 -- 392Karima Ait Abdelouhab, Djilali Idoughi, Christophe Kolski. A framework combining agile, user-centred design and service-oriented architecture approaches for collaborative disaster management system design
393 -- 416Djalal Hedjazi. Constructing collective competence: a new CSCW-based approach

Volume 12, Issue 1/2

1 -- 15Xiaoqing Tan, Xiaoqian Zhang. Quantum information exchange protocol associated with the quantum cloud
16 -- 30Zhengjun Jing, Guoping Jiang, Chunsheng Gu. A novel identity-based anonymous authentication scheme from multilinear maps
31 -- 50Qiu-yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang. An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
51 -- 73Ankur Mishra, B. B. Gupta. Intelligent phishing detection system using similarity matching algorithms
74 -- 97Syam Kumar Pasupuleti. Effective and secure data storage in multi-cloud storage architectures
98 -- 112Yang Jing, Zeng Hui, Huang Jiangping. Grey neural network prediction model based on fruit fly optimisation algorithm and its application
113 -- 130Jianhong Zhang, Xubing Zhao, Weina Zhen. 2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension
131 -- 142S. Anthoniraj, S. Saraswathi. Frequent failure monitoring and reporting in virtualisation environment using backing algorithm technique
143 -- 161Xiaoli Gong, Zhaoyang Shao, Qi Du, Aimin Yu, Jin Zhang. Performance overhead analysis of virtualisation on ARM
162 -- 174Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin. A review: The effects of imperfect data on incremental decision tree
175 -- 185Wei Zhang. The design of strain sensitising of high-sensitivity SAW sensor based on FBG
186 -- 208Ali Kanso, Abdelouahed Gherbi, Yves Lemieux. Middleware-managed high availability for cloud applications
209 -- 228Guoqiang Gao, Ruixuan Li, Zhiyong Xu. Mimir: a term-distributed retrieval system for secret documents