Journal: J. Network and Computer Applications

Volume 34, Issue 5

1447 -- 1448Han-Chieh Chao, Jean-Pierre Seifert, Shiguo Lian, Liang Zhou. Dependable multimedia communications: Systems, services, and applications
1449 -- 1458Rongbo Zhu. Intelligent rate control for supporting real-time traffic in WLAN mesh networks
1459 -- 1467Po-Yi Shih, Po-Chuan Lin, Jhing-Fa Wang, Yuan-Ning Lin. Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification
1468 -- 1473Der-Jiunn Deng. PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks
1474 -- 1488Philip Leroux, Steven Latré, Nicolas Staelens, Piet Demeester, Filip De Turck. Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service
1489 -- 1497Wen Ji, Min Chen, Xiaohu Ge, Peng Li, Yiqiang Chen. A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle
1498 -- 1508Sanjay Kumar Dhurandher, Sudip Misra, Puneet Pruthi, Shubham Singhal, Saurabh Aggarwal, Isaac Woungang. Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks
1509 -- 1517I-Ju Liao, Tin Yu Wu, Jen-Wen Ding, Wei-Tsong Lee. A novel 3D streaming protocol supported multi-mode display
1518 -- 1529Rashid Mehmood, Raad Alturki, Sherali Zeadally. Multimedia applications over metropolitan area networks (MANs)
1530 -- 1544Sudip Misra, Ankur Jain. Policy controlled self-configuration in unattended wireless sensor networks
1545 -- 1556Chia-Hui Wang, Yu-Shun Liu. A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
1557 -- 1565Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang. A passive image authentication scheme for detecting region-duplication forgery with rotation
1566 -- 1571Yeong-Sheng Chen, Yuan-Wei Lee, Jong Hyuk Park. Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks
1572 -- 1586Kevin J. Ma, Radim Bartos, Swapnil Bhatia. A survey of schemes for Internet-based video delivery
1587 -- 1614Neyre Tekbiyik, Elif Uysal-Biyikoglu. Energy efficient wireless unicast routing alternatives for machine-to-machine networks
1615 -- 1622Ching-Hao Mao, Hahn-Ming Lee, Che-Fu Yeh. Adaptive e-mails intention finding system based on words social networks
1623 -- 1633Jun Yang, Bin Dai, Benxiong Huang, Shui Yu. Orthogonal feedback scheme for network coding
1634 -- 1647Jordán Pascual Espada, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle, B. Cristina Pelayo García-Bustelo, Manuel Álvarez Álvarez, Alejandro González García. Modeling architecture for collaborative virtual objects based on services
1648 -- 1659Ting Chen, Xiaosong Zhang, Hua Li, Xiong-da Li, Yue Wu. Fast quarantining of proactive worms in unstructured P2P networks
1660 -- 1670Anindya Tahsin Prodhan, Rajkumar Das, Humayun Kabir, Gholamali C. Shoja. TTL based routing in opportunistic networks
1671 -- 1682Imad Jawhar, Nader Mohamed, Dharma P. Agrawal. Linear wireless sensor networks: Classification and applications
1683 -- 1694Stenio F. L. Fernandes, Judith Kelner, Djamel Sadok. An adaptive-predictive architecture for video streaming servers
1695 -- 1706Liqiang Zhang, Yu-Jen Cheng, Xiaobo Zhou. Enhanced statistics-based rate adaptation for 802.11 wireless networks
1707 -- 1716Martin Kuehnhausen, Victor S. Frost. Application of the Java Message Service in mobile monitoring environments
1717 -- 1723Zac Sadan, David G. Schwartz. Social network analysis of web links to eliminate false positives in collaborative anti-spam systems
1724 -- 1731Chien-Lung Hsu, Han-Yu Lin. New identity-based key-insulated convertible multi-authenticated encryption scheme
1732 -- 1742Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Qiuzhen Huang. Monitoring abnormal network traffic based on blind source separation approach
1743 -- 1756Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen. Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks
1757 -- 1770Wenjia Niu, Gang Li, Hui Tang, Xu Zhou, Zhongzhi Shi. CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition