Journal: JCM

Volume 5, Issue 1

1 -- 4Athanasios V. Vasilakos, Neal N. Xiong, Laurence Tianruo Yang, Chuan Lin, Lei Shu. Guest Editorial
5 -- 12Chin-Chen Chang, Pei-Yu Lin, Zhi-Hui Wang, Ming-Chu Li. A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)
13 -- 22Wenping Deng, Peidong Zhu, Xicheng Lu, Bernhard Plattner. On Evaluating BGP Routing Stress Attack
23 -- 30Guangjie Han, Lei Shu, Jianhua Ma, Jong Hyuk Park, Jianjun Ni. Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks
31 -- 38Naixue Xiong, Jing He, Yan Yang, Yanxiang He, Tai-Hoon Kim, Chuan Lin. A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper)
39 -- 49Massimiliano Rak, Rocco Aversa, Beniamino Di Martino, Antonio Sgueglia. Web Services Resilience Evaluation using LDS Load dependent Server Models.
50 -- 56Pramod K. Suri, Kavita Taneja. M3S: Markovian Mobility Management Simulator for Mobility Conscious Routing in Global Networks
57 -- 62Guiyi Wei, Yun Ling, Ye Gu, Yujia Ge. A Dependable Cluster Based Topology in P2P Networks
63 -- 70Hongju Cheng, Naixue Xiong, Guolong Chen, Xiaofang Zhuang. Channel Assignment with Topology Preservation for Multi-radio Wireless Mesh Networks
71 -- 80Toshikazu Uemura, Tadashi Dohi. Optimal Security Patch Management Policies Maximizing System Availability
81 -- 87Zizhong Chen. Adaptive Checkpointing (Invited Paper)