Journal: J. High Speed Networks

Volume 23, Issue 4

271 -- 286S. F. El-Zoghdy, Ahmed Ghoneim. New selection based model for filtering heterogeneous distributed computing systems based on quality of services criteria and load balancing polices
271 -- 286S. F. El-Zoghdy, Ahmed Ghoneim. New selection based model for filtering heterogeneous distributed computing systems based on quality of services criteria and load balancing polices
287 -- 309Abdelhalim Hacini, Mourad Amad, Semchedine Fouzi. A scalable and hierarchical P2P architecture based on Pancake graph for group communication
287 -- 309Abdelhalim Hacini, Mourad Amad, Fouzi Semchedine. A scalable and hierarchical P2P architecture based on Pancake graph for group communication
311 -- 322Shinji Sakamoto, Ryoichiro Obukata, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Admir Barolli. Performance analysis of two Wireless Mesh Network architectures by WMN-SA and WMN-TS simulation systems
311 -- 322Shinji Sakamoto, Ryoichiro Obukata, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Admir Barolli. Performance analysis of two Wireless Mesh Network architectures by WMN-SA and WMN-TS simulation systems
323 -- 339Jung-Shian Li, Chuan-Kai Kao, Chia-Yang Tsai, I-Hsien Liu, Chuan-Gang Liu. Low-cost localization service for roadside sensors based on passive information
323 -- 339Jung-Shian Li, Chuan-Kai Kao, Chia-Yang Tsai, I-Hsien Liu, Chuan-Gang Liu. Low-cost localization service for roadside sensors based on passive information
341 -- 359Fei-Yan Fan, Tanghuai Fan, Yi-Ming Mao. Design and implementation of NAT traversal based on SCDMA access gateway
341 -- 359Fei-Yan Fan, Tanghuai Fan, Yiming Mao. Design and implementation of NAT traversal based on SCDMA access gateway
361 -- 368Heejung Byun. A method of data propagation with operator intent delivery for wireless sensor networks
361 -- 368Heejung Byun. A method of data propagation with operator intent delivery for wireless sensor networks

Volume 23, Issue 3

187 -- 199Chulmin Kim, Cheeha Kim. A new reservation-based Medium-Access Control for full-duplex WLANs
201 -- 213Xiaonan Wang, Hongbin Cheng, Yufeng Yao. Cross-layering IPv6 fast handover in IEEE 802.16
215 -- 223Le Chen, Linquan Xie, Shuxin Yang, Ying Cao, Ge Huang, Xiaorong Li. An algorithm to detect complexes in PPI network based on harmony search clustering optimization
225 -- 236Walter Balzano, Aniello Murano, Silvia Stranieri. Logic-based clustering approach for management and improvement of VANETs
237 -- 253Masoud Soursouri, Mahmood Ahmadi. Adaptive resource allocation for software defined networking controllers
255 -- 269Mohand Yazid Saidi, Bernard Cousin. Resource sharing strategies: Which sharing to better protect primary shortest paths?

Volume 23, Issue 2

93 -- 108D. G. Narayan, Uma Mudenagudi. A joint approach to routing metrics and application-aware rate adaptation in multi-radio wireless mesh networks
109 -- 135Baatarsuren Munkhdorj, Yuji Sekiya. Cyber attack prediction using social data analysis
137 -- 147Shuxin Yang, Xi Wang, Chenghui Liu. A heat diffusion model based algorithm for personalized influence maximization in social network
149 -- 162Giuseppe Corrente. Performance issues in content dissemination to metropolitan mobile users
163 -- 173Ilir Shinko, Vladi Kolici, Admir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa. Performance analysis of different architectures and TCP congestion-avoidance algorithms using WMN-GA simulation system
175 -- 186Ugo Gentile, Simona Bernardi, Stefano Marrone, José Merseguer, Valeria Vittorini. A model driven approach for assessing survivability requirements of critical infrastructures

Volume 23, Issue 1

1 -- 14Himanish Shekhar Das, Sanghita Bhattacharjee. A congestion aware routing for lifetime improving in grid-based sensor networks
15 -- 32Subhashree V. K., Tharini C.. An Energy Efficient Routing and Fault Tolerant Data Aggregation (EERFTDA) algorithm for wireless sensor networks
33 -- 47Angzhan Wen, Weiwei Lin, Yacong Ma, Haoan Xie, Guoqiang Zhang. News event evolution model based on the reading willingness and modified TF-IDF formula
49 -- 57Beibei Li, Bo Liu, Weiwei Lin, Ying Zhang. Performance analysis of clustering algorithm under two kinds of big data architecture
59 -- 66Miralda Cuka, Ilir Shinko, Evjola Spaho, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. A simulation system based on ONE and SUMO simulators: Performance evaluation of different vehicular DTN routing protocols
67 -- 91Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja. Overlay based defensive architecture to survive DDoS: A comparative study