Journal: J. Network and Computer Applications

Volume 33, Issue 6

631 -- 632Jason J. Jung, Chung-Ming Ou, Ngoc Thanh Nguyen, Chonggun Kim. Advances on agent-based network management
633 -- 645Bo Chen. Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
646 -- 652Mary Wu, Chonggun Kim. A cost matrix agent for shortest path routing in ad hoc networks
653 -- 660Pradeep Ray, Nandan Parameswaran, Lundy Lewis. Distributed autonomic management: An approach and experiment towards managing service-centric networks
661 -- 671S. Venkatesan 0002, C. Chellappan, T. Vengattaraman, P. Dhavachelvan, Anurika Vaish. Advanced mobile agent security models for code integrity and malicious availability check
672 -- 681Yao-Tien Wang. A dynamic resource management in mobile agent by artificial neural network
682 -- 695Yue-Shan Chang, Pei-Chun Shih. A resource-awareness information extraction architecture on mobile grid environment
696 -- 706Umar Manzoor, Samia Nefti. QUIET: A Methodology for Autonomous Software Deployment using Mobile Agents

Volume 33, Issue 5

523 -- 524Jameela Al-Jaroodi, Nader Mohamed. Middleware trends for network applications
525 -- 541Chiara Boldrini, Marco Conti, Franca Delmastro, Andrea Passarella. Context- and social-aware middleware for opportunistic networks
542 -- 555Praveen Madiraju, Srilaxmi Malladi, Janaka Balasooriya, Arthi Hariharan, Sushil K. Prasad, Anu G. Bourgeois. A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
556 -- 568Jordi Pujol Ahulló, Pedro García López. Enabling portability in advanced information-centric services over structured peer-to-peer systems
569 -- 587Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Moreira, Cristiano G. Rezende, Antonio Alfredo Ferreira Loureiro, Azzedine Boukerche. Adaptive security protocol selection for mobile computing
588 -- 602Pedro García López, Raúl Gracia Tinedo, Josep M. Banús Alsina. Moving routing protocols to the user space in MANET middleware
603 -- 610Víctor Manuel Álvarez García, María del Puerto Paule Ruíz, Juan Ramón Pérez Pérez. Voice interactive classroom, a service-oriented software architecture for speech-enabled learning
611 -- 619Yasser Gadallah, Mohamed Adel Serhani, Nader Mohamed. Middleware support for service discovery in special operations mobile ad hoc networks
620 -- 630Bo Cheng, Yang Zhang, Peng Zhou, Hua Duan, Xiaoxiao Hu, Zheng Wang, Junliang Chen. Development of Web-Telecom based hybrid services orchestration and execution middleware over convergence networks

Volume 33, Issue 4

353 -- 362Chung-Nan Lee, Yung-Cheng Kao, Ming-Te Tsai. A vEB-tree-based architecture for interactive video on demand services in peer-to-peer networks
363 -- 374Neelofer Tamboli, Mohamed Younis. Coverage-aware connectivity restoration in mobile sensor networks
375 -- 382Leopoldo Carro-Calvo, Sancho Salcedo-Sanz, José Antonio Portilla-Figueras, Emilio G. Ortíz-García. A genetic algorithm with switch-device encoding for optimal partition of switched industrial Ethernet networks
383 -- 396Lei Wang, Ruizhong Wei, Yaping Lin, Bo Wang. A clique base node scheduling method for wireless sensor networks
397 -- 409Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee. Enabling inter-PMIPv6-domain handover with traffic distributors
410 -- 421Christos Bouras, Vassilis Poulopoulos, Vassilis Tsogkas. Adaptation of RSS feeds based on the user profile and on the end device
422 -- 432Yuwang Yang, Chunshan Zhong, Yamin Sun, Jingyu Yang. Network coding based reliable disjoint and braided multipath routing for sensor networks
433 -- 446Arthur C. Callado, Judith Kelner, Djamel Sadok, Carlos Alberto Kamienski, Stenio F. L. Fernandes. Better network traffic identification through the independent combination of techniques
447 -- 466David González Ortega, Francisco Javier Díaz Pernas, Mario Martínez-Zarzuela, Miriam Antón-Rodríguez, José Fernando Díez Higuera, Daniel Boto-Giralda. Real-time hands, face and facial features detection and tracking: Application to cognitive rehabilitation tests monitoring
467 -- 476Chih-Peng Lin, Jenhui Chen, Hsing-Lung Chen. An efficient bandwidth allocation algorithm for real-time VBR stream transmission under IEEE 802.16 wireless networks
477 -- 490Javad Akbari Torkestani, Mohammad Reza Meybodi. An efficient cluster-based CDMA/TDMA scheme for wireless mobile ad-hoc networks: A learning automata approach
491 -- 502Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Christopher Leckie. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
503 -- 511Henrique S. L. Pequeno, George A. M. Gomes, Rossana M. C. Andrade, José Neuman de Souza, Miguel Franklin de Castro. FrameIDTV: A framework for developing interactive applications on digital television environments
512 -- 522Hui Cheng, Xingwei Wang, Shengxiang Yang, Min Huang, Jiannong Cao. QoS multicast tree construction in IP/DWDM optical internet by bio-inspired algorithms

Volume 33, Issue 3

205 -- 206Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang. Special issue on: Recent advances and future directions in biometrics personal identification
207 -- 220Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang, Jie Tian. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
221 -- 235Eryun Liu, Jimin Liang, Liaojun Pang, Min Xie, Jie Tian. Minutiae and modified Biocode fusion for fingerprint-based key generation
236 -- 246Chulhan Lee, Jaihie Kim. Cancelable fingerprint templates using minutiae-based bit-strings
247 -- 257Miao Qi, Yinghua Lu, Ning Du, Yinan Zhang, Chengxi Wang, Jun Kong. A novel image hiding approach based on correlation analysis for secure multimodal biometrics
258 -- 267Kai Cao, Xin Yang, Xunqiang Tao, Peng Li, Yali Zang, Jie Tian. Combining features for distorted fingerprint matching
268 -- 274Neyire Deniz Sarier. Improving the accuracy and storage cost in biometric remote authentication schemes
275 -- 282Zhi Liu, Yilong Yin, Hongjun Wang, Shangling Song, Qingli Li. Finger vein recognition with manifold learning
283 -- 292Dong-Ju Kim, Jeong-Hoon Shin, Kwang-Seok Hong. Teeth recognition based on multiple attempts in mobile device
293 -- 299David Delgado Gomez, Federico Sukno, David Aguado, Carlos Santa Cruz, Antonio Artés-Rodríguez. Individual identification using personality traits
300 -- 313Hunny Mehrotra, Banshidhar Majhi, Phalguni Gupta. Robust iris indexing scheme using geometric hashing of SIFT keypoints
314 -- 322Jian-Gang Wang, Eric Sung, Wei-Yun Yau. Incremental two-dimensional linear discriminant analysis with applications to face recognition
323 -- 332Jianzhong Wang, Baoxue Zhang, Shuyan Wang, Miao Qi, Jun Kong. An adaptively weighted sub-pattern locality preserving projection for face recognition
333 -- 341Kumiko Yasuda, Daigo Muramatsu, Satoshi Shirato, Takashi Matsumoto. Visual-based online signature verification using features extracted from video
342 -- 351Siraj A. Shaikh, Joseph R. Rabaiotti. Characteristic trade-offs in designing large-scale biometric-based identity management systems

Volume 33, Issue 2

63 -- 75Junqi Zhang, Vijay Varadharajan. Wireless sensor network key management survey and taxonomy
76 -- 83Weili Han, Min Xu, Weidong Zhao, Guofu Li. A trusted decentralized access control framework for the client/server architecture
84 -- 97Matthias Strobbe, Olivier Van Laere, Samuel Dauwe, Bart Dhoedt, Filip De Turck, Piet Demeester, Christof van Nimwegen, Jeroen Vanattenhoven. Interest based selection of user generated content for rich communication services
98 -- 114Cheng-Fu Chou, William C. Cheng, Leana Golubchik. Performance study of online batch-based digital signature schemes
115 -- 127Ming Xu, Shuigeng Zhou, Jihong Guan, Xiaohua Hu. A path-traceable query routing mechanism for search in unstructured peer-to-peer networks
128 -- 140Eduardo Moschetta, Rodolfo S. Antunes, Marinho P. Barcellos. Flexible and secure service discovery in ubiquitous computing
141 -- 155Jenn-Wei Lin, Wei-Shou Wang. An efficient reconstruction approach for improving Bluetree scatternet formation in personal area networks
156 -- 167Ming-Yang Su. Discovery and prevention of attack episodes by frequent episodes mining and finite state machines
168 -- 182Haïdar Safa, Hassan Artail, Mirna Nahhas. A cache invalidation strategy for mobile networks
183 -- 202Yuh-Jzer Joung, Zhang-Wen Lin. On the self-organization of a hybrid peer-to-peer system

Volume 33, Issue 1

1 -- 5Chun-Ta Li, Min-Shiang Hwang. An efficient biometrics-based remote user authentication scheme using smart cards
6 -- 15K. Salah, A. Kahtani. Performance evaluation comparison of Snort NIDS under Linux and Windows Server
16 -- 28Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Elisavet Konstantinou. A framework for identity privacy in SIP
29 -- 34Jianhong Zhang, Chenglian Liu, Yixian Yang. An efficient secure proxy verifiably encrypted signature scheme
35 -- 42Nader Mohamed, Jameela Al-Jaroodi. Self-configured multiple-network-interface socket
43 -- 49Ming-Wen Tong, Zong-Kai Yang, Qing-Tang Liu. A novel model of adaptation decision-taking engine in multimedia adaptation
50 -- 62Youtao Zhang, Jun Yang 0002, Weijia Li, Linzhang Wang, Lingling Jin. An authentication scheme for locating compromised sensor nodes in WSNs