Journal: J. Network and Computer Applications

Volume 35, Issue 6

1657 -- 1673Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Halabi Hasbullah. Performance comparison of end-to-end mobility management protocols for TCP
1674 -- 1690Allen Lehopotseng Ramaboli, Olabisi Emmanuel Falowo, H. Anthony Chan. Bandwidth aggregation in heterogeneous wireless networks: A survey of current approaches and issues
1691 -- 1708Sazia Parvin, Farookh Khadeer Hussain, Omar Khadeer Hussain, Song Han, Biming Tian, Elizabeth Chang. Cognitive radio network security: A survey
1709 -- 1719Shajulin Benedict. Energy-aware performance analysis methodologies for HPC architectures - An exploratory study
1720 -- 1727Tarek Moulahi, Salem Nasri, Hervé Guyennet. Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc
1728 -- 1739JungYul Choi, Mingon Kim, Hongkyu Jeong, Hong-Shik Park. Power-saving mechanisms for energy efficient IEEE 802.16e/m
1740 -- 1748Jihao Yin, Chongyang Fu, Jiankun Hu. Using incremental subspace and contour template for object tracking
1749 -- 1761Hamid Shokrzadeh, Siavash Khorsandi, Abolfazl Toroghi Haghighat. Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks
1762 -- 1770Kwangcheol Shin, Kyungjun Kim, Soontae Kim. Traffic management strategy for delay-tolerant networks
1771 -- 1780M. S. Kakkasageri, S. S. Manvi. Multiagent driven dynamic clustering of vehicles in VANETs
1781 -- 1792Alexandre Aguiar Amaral, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Joel José Puga Coelho Rodrigues, Mario Lemes Proença Jr.. Inference of network anomaly propagation using spatio-temporal correlation
1793 -- 1806Qi Shi, Ning Zhang, David Llewellyn-Jones. Efficient autonomous signature exchange on ubiquitous networks
1807 -- 1817Victoria Ying Zhang, Albert Kai-Sun Wong. Kernel-based particle filtering for indoor tracking in WLANs
1818 -- 1830Mourad Amad, Ahmed Meddahi, Djamil Aïssani, Zonghua Zhang. HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity
1831 -- 1838Sandeep K. Sood. A combined approach to ensure data security in cloud computing
1839 -- 1846Zuowen Tan. A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
1847 -- 1862Bo Dong, Qinghua Zheng, Feng Tian, Kuo-Ming Chao, Rui Ma, Rachid Anane. An optimized approach for storing and accessing small files on cloud storage
1863 -- 1878Rafael Antonello, Stenio F. L. Fernandes, Carlos Alberto Kamienski, Djamel Sadok, Judith Kelner, István Gódor, Géza Szabó, Tord Westholm. Deep packet inspection tools and techniques in commodity platforms: Challenges and trends
1879 -- 1890Mari Carmen Domingo. An overview of the internet of underwater things
1891 -- 1900Javier Barrachina, Piedad Garrido, Manuel Fogue, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. VEACON: A Vehicular Accident Ontology designed to improve safety on the roads
1901 -- 1917Adamu Murtala Zungeru, Li-minn Ang, Kah Phooi Seng. Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks
1918 -- 1933Mohamed Bakillah, Mir Abolfazl Mostafavi, Steve H. L. Liang, Alexander Zipf. Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases
1934 -- 1952Giancarlo Fortino, Antonio Guerrieri, Gregory M. P. O'Hare, Antonio G. Ruzzelli. A flexible building management framework based on wireless sensor and actuator networks
1953 -- 1963Linfeng Liu, Ruchuan Wang, Fu Xiao. Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes
1964 -- 1972Gurpreet Singh, Neeraj Kumar, Anil K. Verma. Ant colony algorithms in MANETs: A review
1973 -- 1978S. Sudha, N. Ammasaigounden. An aggregate marker for bandwidth fairness in DiffServ
1979 -- 1989Li Li, Qing-Shan Jia, Hengtao Wang, Ruixi Yuan, Xiaohong Guan. A systematic method for network topology reconfiguration with limited link additions
1990 -- 2002Chih-Lin Hu, Tzu-Han Kuo. A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems
2003 -- 2015Miguel Franklin de Castro, Levi Bayde Ribeiro, Camila Helena Souza Oliveira. An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing
2016 -- 2027Mohammad Hassan Hajiesmaili, Ahmad Khonsari, Ali Sehati, Mohammad Sadegh Talebi. Content-aware rate allocation for efficient video streaming via dynamic network utility maximization
2028 -- 2036Javad Akbari Torkestani. A distributed resource discovery algorithm for P2P grids
2037 -- 2050D. Gregor, Sergio L. Toral Marín, T. Ariza, Federico Barrero. An ontology-based semantic service for cooperative urban equipments
2051 -- 2058Qingyang Song, Zhaolong Ning, Shiqiang Wang, Abbas Jamalipour. Link stability estimation based on link connectivity changes in mobile ad-hoc networks
2059 -- 2067Süleyman Kardas, Serkan Celik, Muhammet Yildiz, Albert Levi. PUF-enhanced offline RFID security and privacy
2068 -- 2080Khalid A. Darabkh, Shereen S. Ismail, Mohammad Al-Shurman, Iyad F. Jafar, Eman Alkhader, Mamoun F. Al-Mistarihi. Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks
2081 -- 2091Yi Xie, J. Hu, S. Tang, X. Huang. A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network
2092 -- 2104Yuan-Cheng Lai, Yen Hung Chen. A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks

Volume 35, Issue 5

1375 -- 1376Paolo Bellavista, Chi-Ming Chen, Hossam S. Hassanein. Special issue on service delivery management in broadband networks
1377 -- 1391Djamal-Eddine Meddour, Alaeddine Abdallah Djamal, Toufik Ahmed, Raouf Boutaba. A cross layer architecture for multicast and unicast video transmission in mobile broadband networks
1392 -- 1401Cristiano Bonato Both, Clarissa Cassales Marquezan, Rafael Kunst, Lisandro Zambenedetti Granville, Juergen Rochol. A self-adapting connection admission control solution for mobile WiMAX: Enabling dynamic switching of admission control algorithms based on predominant network usage profiles
1402 -- 1414Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Maurizio D'Arienzo. Unified architecture for network measurement: The case of available bandwidth
1415 -- 1423Werner Sandmann. Delays in a series of queues with correlated service times
1424 -- 1435Kaouther Abrougui, Azzedine Boukerche, Hussam M. Soliman Ramadan. Performance evaluation of an efficient fault tolerant service discovery protocol for vehicular networks
1436 -- 1445Nassima Hadid, Alexandre Guitton, Michel Misson. Exploiting a meeting channel to interconnect mobile robots
1446 -- 1453Christos Bouras, Vassilis Poulopoulos. Enhancing meta-portals using dynamic user context personalization techniques
1454 -- 1472Ahmed A. Mosa, Aisha H. Abdalla, Rashid A. Saeed. Evaluation of MANEMO route optimization schemes
1473 -- 1492Antonio Ruiz-Martínez. A survey on solutions and main free tools for privacy enhancing Web communications
1493 -- 1507Mohammad Masdari, Mehdi Maleknasab, Moazam Bidaki. A survey and taxonomy of name systems in mobile ad hoc networks
1508 -- 1536Adamu Murtala Zungeru, Li-minn Ang, Kah Phooi Seng. Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison
1537 -- 1547Liang Liu, Xiaolin Qin, Guineng Zheng. Reliable spatial window aggregation query processing algorithm in wireless sensor networks
1548 -- 1558Kranthi K. Mamidisetty, Michael J. Ferrara, Shivakumar Sastry. Systematic selection of cluster heads for data collection
1559 -- 1567Rosen Ivanov. Real-time GPS track simplification algorithm for outdoor navigation of visually impaired
1568 -- 1578Yun He, Zhongyang Xiong, Yufang Zhang, Xiaolin Tan, Zhixing Li. Modeling and analysis of multi-channel P2P VoD systems
1579 -- 1597Patrick Battistello, Joaquín García-Alfaro, Cyril Delétré. Transaction-based authentication and key agreement protocol for inter-domain VoIP
1598 -- 1605Samia A. Ali, Khaled M. Shaaban, Islam M. Alkabbany. Distributed patching for mobile wireless sensor networks
1606 -- 1614Jipeng Zhou, Liyang Peng, Yuhui Deng, Jian-zhu Lu. An on-demand routing protocol for improving channel use efficiency in multichannel ad hoc networks
1615 -- 1619Seiven Leu, Ruay Shiung Chang. A weight-value algorithm for finding connected dominating sets in a MANET
1620 -- 1632Bert Vankeirsbilck, Dieter Verslype, Nicolas Staelens, Pieter Simoens, Chris Develder, Bart Dhoedt, Filip De Turck, Piet Demeester. Automatic fine-grained area detection for thin client systems
1633 -- 1645Javad Akbari Torkestani. Mobility prediction in mobile wireless networks
1646 -- 1656Ashok Kumar Das, Pranay Sharma, Santanu Chatterjee, Jamuna Kanta Sing. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Volume 35, Issue 4

1175 -- 1176Alfredo Cuzzocrea. Intelligent algorithms for data-centric sensor networks
1177 -- 1190Aris A. Papadopoulos, Alfredo Navarra, Julie A. McCann, Maria Cristina Pinotti. VIBE: An energy efficient routing protocol for dense and mobile sensor networks
1191 -- 1202Mark Roantree, Jie Shi, Paolo Cappellari, Martin F. O'Connor, Michael Whelan, Niall Moyna. Data transformation and query management in personal health sensor networks
1203 -- 1209Paolo Bellavista, Giuseppe Cardone, Antonio Corradi, Luca Foschini. The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency
1210 -- 1217Alfredo Cuzzocrea, Alexis Papadimitriou, Dimitrios Katsaros, Yannis Manolopoulos. Edge betweenness centrality: A novel algorithm for QoS-based topology control over wireless sensor networks
1218 -- 1234Gianluca Moro, Gabriele Monti. W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks
1235 -- 1248R. Madhusudhan, R. C. Mittal. Dynamic ID-based remote user password authentication schemes using smart cards: A review
1249 -- 1259Jan von Mulert, Ian Welch, Winston Khoon Guan Seah. Security threats and solutions in MANETs: A case study using AODV and SAODV
1260 -- 1276Chien-Fu Cheng, Kuo-Tang Tsai. Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks
1277 -- 1284Dong Kun Noh, Junbeom Hur. Using a dynamic backbone for efficient data delivery in solar-powered WSNs
1285 -- 1296Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, Shui Yu. M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models
1297 -- 1303Najme Mansouri, Gholamhosein Dastghaibyfard. A dynamic replica management strategy in data grid
1304 -- 1316Kenneth J. Turner, Koon Leai Larry Tan. Rigorous development of composite grid services
1317 -- 1328Mustapha Réda Senouci, Abdelhamid Mellouk, Hadj Senouci, Amar Aissani. Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols
1329 -- 1351Hassen A. Mogaibel, Mohamed Othman, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid. On-demand channel reservation scheme for common traffic in wireless mesh networks
1352 -- 1360Elizabeth A. Thompson, Nathan Clem, Isaac Renninger, Timothy Loos. Software-defined GPS receiver on USRP-platform
1361 -- 1366Ameen M. Alkharasani, Mohamed Othman. 2tswTCM: A new efficient optimization marker algorithm to improve fairness bandwidth in DiffServ networks
1367 -- 1373Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong. Privacy enhanced data outsourcing in the cloud
1374 -- 0Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar. Corrigendum to "Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams" [J. Network Comput. Appl. 35 (3) (2012) 1116-1129]

Volume 35, Issue 3

865 -- 866Laurence Tianruo Yang, Guojun Wang. Special issue on trusted computing and communications
867 -- 880Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
881 -- 891Lei Jiang, Lixin Ding, Jianxun Liu, Jinjun Chen. Reputation rating modeling for open environment lack of communication by using online social cognition
892 -- 904Weizhong Qiang, Aleksandr Konstantinov, Deqing Zou, Laurence Tianruo Yang. A standards-based interoperable single sign-on framework in ARC Grid middleware
905 -- 913Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li, Yixian Yang. Public key distribution scheme for delay tolerant networks based on two-channel cryptography
914 -- 926Fei Wang, Furong Wang, Benxiong Huang, Laurence Tianruo Yang. SONR: A reliable reputation system of self-organized network
927 -- 933Qin Liu, Guojun Wang, Jie Wu 0001. Secure and privacy preserving keyword searching for cloud storage services
934 -- 941Félix Gómez Mármol, Gregorio Martínez Pérez. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
942 -- 950Mohammad-Amin Kharraz, Hamid Sarbazi-Azad, Albert Y. Zomaya. On-demand multicast routing protocol with efficient route discovery
951 -- 961Huanyu Zhao, Xin Yang, Xiaolin Andy Li. An incentive mechanism to reinforce truthful reports in reputation systems
962 -- 973Laiping Zhao, Yizhi Ren, MingChu Li, Kouichi Sakurai. Flexible service selection with user-specific QoS support in service-oriented architecture
974 -- 981Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei. Security model oriented attestation on dynamically reconfigurable component-based systems
982 -- 991Min Choi, Jong Hyuk Park, Seungho Lim, Young-Sik Jeong. Achieving reliable system performance by fast recovery of branch miss prediction
992 -- 1000Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu. Generating regular expression signatures for network traffic classification in trusted network management
1001 -- 1012Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
1013 -- 1021Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene. Real-time data management on wireless sensor networks: A survey
1022 -- 1034Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao. Detecting node replication attacks in wireless sensor networks: A survey
1035 -- 1051Jihao Yin, Yifei Wang, Jiankun Hu. Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration
1052 -- 1066Panho Lee, Anura P. Jayasumana, H. M. N. Dilum Bandara, Sanghun Lim, V. Chandrasekar. A peer-to-peer collaboration framework for multi-sensor data fusion
1067 -- 1073Chao-Yang Lee, Shou-Jen Lin, Chen-Wei Lee, Chu-Sing Yang. An efficient continuous tracking system in real-time surveillance application
1074 -- 1085Rajashekhar C. Biradar, Sunilkumar S. Manvi. Neighbor supported reliable multipath multicast routing in MANETs
1086 -- 1105Jesús Gallardo, Crescencio Bravo, Miguel A. Redondo. A model-driven development method for collaborative modeling tools
1106 -- 1115S. Suraprasert, Jittat Fakcharoenphol. Comparison of recovery schemes to maximize restorable throughput in multicast networks
1116 -- 1129Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar. Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams
1130 -- 1139Abderrahmane Baadache, Ali Belmehdi. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
1140 -- 1150M. C. Batistatos, George V. Tsoulos, Georgia E. Athanasiadou. Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges
1151 -- 1161Zubair A. Baig. Multi-agent systems for protecting critical infrastructures: A survey
1162 -- 1174Abhik Banerjee, Chuan Heng Foh, Chai Kiat Yeo, Bu-Sung Lee. Performance improvements for network-wide broadcast with instantaneous network information

Volume 35, Issue 2

517 -- 0Mesut Günes, Yan Zhang. In memory of Mieso Denko
518 -- 526Ming-Tuo Zhou, Hiroshi Harada. Cognitive maritime wireless mesh/ad hoc networks
527 -- 537Theofanis P. Lambrou, Christos G. Panayiotou. A testbed for coverage control using mixed wireless sensor networks
538 -- 547Joachim Fischer, Jens-Peter Redlich, Jochen Zschau, Claus Milkereit, Matteo Picozzi, Kevin Fleming, Mihal Brumbulli, Björn Lichtblau, Ingmar Eveslage. A wireless mesh sensing network for early warning
548 -- 561Evangelos Theodoridis, Ioannis Chatzigiannakis, Stefan Dulman. Post-processing in wireless sensor networks: Benchmarking sensor trace files for in-network data aggregation
562 -- 576Iván Corredor, José F. Martínez, Miguel S. Familiar, Lourdes López. Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services
577 -- 583Bo Yang 0005, Mareboyana Manohar. Similarity search in sensor networks using semantic-based caching
584 -- 596Mari Carmen Domingo. An overview of the Internet of Things for people with disabilities
597 -- 605Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan. A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks
606 -- 618Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha. A comparison of wavelength reservation protocols for WDM optical networks
619 -- 632Chuan Zhu, Chunlin Zheng, Lei Shu, Guangjie Han. A survey on coverage and connectivity issues in wireless sensor networks
633 -- 643Jingyu Wang, Jianxin Liao, Tonghong Li. OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer
644 -- 656Sanaa Sharafeddine, Ibrahim Al-Kassem, Zaher Dawy. A scatternet formation algorithm for Bluetooth networks with a non-uniform distribution of devices
657 -- 667Wenjie Zhang, Chai Kiat Yeo. Throughput and delay scaling laws for mobile overlaid wireless networks
668 -- 680Hoda Hassan, Mohamed Eltoweissy. CORM: A reference model for future computer networks
681 -- 694Nicola Cordeschi, Tatiana Patriarca, Enzo Baccarelli. Stochastic traffic engineering for real-time applications over wireless networks
695 -- 712Francisco Jurado, Miguel A. Redondo, Manuel Ortega. Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice
713 -- 722Golnaz Vakili, Siavash Khorsandi. Coordination of cooperation policies in a peer-to-peer system using swarm-based RL
723 -- 730Radim Burget, Dan Komosny, Kathiravelu Ganeshan. Topology aware feedback transmission for real-time control protocol
731 -- 742Mahboobeh Sedighizad, Babak Seyfe, Keivan Navaie. MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time
743 -- 752Yi-hua Zhu, Hui Xu, Kaikai Chi, Hua Hu. Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN
753 -- 762Carlos Miguel Tavares Calafate, Giancarlo Fortino, Sascha Fritsch, Janio M. Monteiro, Juan-Carlos Cano, Pietro Manzoni. An efficient and robust content delivery solution for IEEE 802.11p vehicular environments
763 -- 769Xiong Li, Yongping Xiong, Jian Ma, Wendong Wang. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
770 -- 777Min-Feng Wang, Meng-Feng Tsai, Sie-Long Jheng, Cheng-Hsien Tang. Social feature-based enterprise email classification without examining email contents
778 -- 786Waltenegus Dargie. A medium access control protocol that supports a seamless handover in wireless sensor networks
787 -- 802Rajesh Karunamurthy, Ferhat Khendek, Roch H. Glitho. A novel architecture for Web service composition
803 -- 817George Kastaniotis, Elias K. Maragos, Christos Douligeris, Dimitris K. Despotis. Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies
818 -- 825Wen-Hwa Liao, Hung-Chun Yang. A power-saving data storage scheme for wireless sensor networks
826 -- 843Gildas Avoine, Xavier Carpent, Benjamin Martin 0002. Privacy-friendly synchronized ultralightweight authentication protocols in the storm
844 -- 856Muhammad Imran, Mohamed Younis, Abas Md Said, Halabi Hasbullah. Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks
857 -- 864Mohit P. Tahiliani, K. C. Shet, T. G. Basavaraju. CARED: Cautious Adaptive RED gateways for TCP/IP networks

Volume 35, Issue 1

1 -- 2Weiming Shen, Yinsheng Li, Anne E. James. Collaborative computing and applications
3 -- 19Hugo Paredes, Fernando Mário Martins. Social interaction regulation in virtual web environments using the Social Theatres model
20 -- 28Weizhan Zhang, Qinghua Zheng, Haifei Li, Feng Tian. An overlay multicast protocol for live streaming and delay-guaranteed interactive media
29 -- 36Min Liu, Shijun Xu, Siyi Sun. An agent-assisted QoS-based routing algorithm for wireless sensor networks
37 -- 59Tossaporn Srisooksai, Kamol Keamarungsi, Poonlap Lamsrichan, Kiyomichi Araki. Practical data compression in wireless sensor networks: A survey
60 -- 71Junzhou Luo, Xiaogang Wang, Ming Yang. An interval centroid based spread spectrum watermarking scheme for multi-flow traceback
72 -- 84Kyuyong Shin, Douglas S. Reeves. Winnowing: Protecting P2P systems against pollution through cooperative index filtering
85 -- 96Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu. Proactive replication for rare objects in unstructured peer-to-peer networks
97 -- 110Kwanghoon Kim. A model-driven workflow fragmentation framework for collaborative workflow architectures and systems
111 -- 120Junpeng Du, ShiKai Jing, Jihong Liu. Creating shared design thinking process for collaborative design
121 -- 131Yunjiao Xue, Hamada Ghenniwa, Weiming Shen. Frame-based ontological view for semantic integration
132 -- 144Hongbo Sun, Wenhui Fan, Weiming Shen, Tianyuan Xiao. Ontology-based interoperation model of collaborative product development
145 -- 155Juan Rodríguez-Covili, Sergio F. Ochoa, José A. Pino. High level MANET protocol: Enhancing the communication support for mobile collaborative work
156 -- 163Yuqing Sun, Dickson K. W. Chiu, Bin Gong, Xiangxu Meng, Peng Zhang. Scheduling mobile collaborating workforce for multiple urgent events
164 -- 175Fabrício Enembreck, Jean-Paul André Barthès. Distributed constraint optimization with MULBS: A case study on collaborative meeting scheduling
176 -- 188Mar Pérez-Sanagustín, Gustavo Ramírez González, Davinia Hernández Leo, Mario Muñoz Organero, Patricia Santos, Josep Blat, Carlos Delgado Kloos. Discovering the campus together: A mobile and computer-based learning experience
189 -- 198Adriana S. Vivacqua, Marcos R. S. Borges. Taking advantage of collective knowledge in emergency response systems
199 -- 210Amir Talaei-Khoei, Pradeep Ray, Nandan Parameswaran, Lundy Lewis. A framework for awareness maintenance
211 -- 220Jameela Al-Jaroodi, Nader Mohamed. Service-oriented middleware: A survey
221 -- 239Rajashekhar C. Biradar, Sunilkumar S. Manvi. Review of multicast routing mechanisms in mobile ad hoc networks
240 -- 252Xianhui Che, Barry Ip. Packet-level traffic analysis of online games from the genre characteristics perspective
253 -- 267Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal. Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues
268 -- 286Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah. Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
287 -- 294Eleftherios Stergiou, John D. Garofalakis. Performance estimation of banyan semi layer networks with drop resolution mechanism
295 -- 315Ibrahim Al-Surmi, Mohamed Othman, Borhanuddin Mohd Ali. Mobility management for IP-based next generation mobile networks: Review, challenge and perspective
316 -- 327Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee. Adaptive load balancing algorithm for multiple homing mobile nodes
328 -- 339Marinho P. Barcellos, Rodolfo Stoffel Antunes, Hisham H. Muhammad, Ruthiano S. Munaretti. Beyond network simulators: Fostering novel distributed applications and protocols through extendible design
340 -- 347Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi. Identity-based online/offline signcryption for low power devices
348 -- 356Walid Saad, Zaher Dawy, Sanaa Sharafeddine. A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
357 -- 364Jing Nie. IPv6 based relay gateway protocol in hybrid networks
365 -- 381Dhiah Al-Shammary, Ibrahim Khalil. Redundancy-aware SOAP messages compression and aggregation for enhanced performance
382 -- 393Eduardo Cañete, Jaime Chen, Rafael Marcos Luque, Bartolomé Rubio. NeuralSens: A neural network based framework to allow dynamic adaptation in wireless sensor and actor networks
394 -- 402Mohammad Javad Rostami, Azadeh Alsadat Emrani Zarandi, Seyed Mohamad Hoseininasab. MSDP with ACO: A maximal SRLG disjoint routing algorithm based on ant colony optimization
403 -- 411Ronald Beaubrun, Jhon-Fredy Llano-Ruiz, Benoit Poirier, Alejandro Quintero. A middleware architecture for disseminating delay-constrained information in wireless sensor networks
412 -- 422Jasma Balasangameshwara, Nedunchezhian Raju. A hybrid policy for fault tolerant load balancing in grid computing environments
423 -- 446Tzu-Chi Huang. Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing
447 -- 458Chao-Tsun Chang. Hash caching mechanism in source-based routing for wireless ad hoc networks
459 -- 468Sajjad Zare, Akbar Ghaffarpour Rahbar. An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON
469 -- 479Jun Huang, Xiaohong Huang, Yan Ma. Routing with multiple quality-of-services constraints: An approximation perspective
480 -- 490Serif Bahtiyar, Mehmet Ufuk Çaglayan. Extracting trust information from security system of a service
491 -- 501Jorge Blasco Alís, Julio César Hernández Castro, José María de Fuentes, Benjamín Ramos. A framework for avoiding steganography usage over HTTP
502 -- 509Bing Hu 0002, Kwan L. Yeung, Zhaoyang Zhang 0001. Load-balanced three-stage switch
510 -- 516Ioannis Krikidis, John S. Thompson. MIMO two-way relay channel with superposition coding and imperfect channel estimation