Journal: J. Network and Computer Applications

Volume 36, Issue 6

1403 -- 1404Weiming Shen, Weidong Li. Collaboration technologies and applications
1405 -- 1417Steven Latré, Jeroen Famaey, John Strassner, Filip De Turck. Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation
1418 -- 1430Yuanhao Xu, Guofu Yin, Yong Nie, Zhengwei He, Xiaolin Dai. Research on an active knowledge push service based on collaborative intent capture
1431 -- 1440Tao Wu, Xiaobing Pei, Yongzhong Lu, Changqing Chen, Liang Gao. A distributed collaborative product design environment based on semantic norm model and role-based access control
1441 -- 1450Amy J. C. Trappey, Charles V. Trappey, Squall Chun-Yi Wu, Chin-Yuan Fan, Yi-Liang Lin. Intelligent patent recommendation system for innovative design collaboration
1451 -- 1465Diego Carvalho Soares, Flávia Maria Santoro, Fernanda Araujo Baião. Discovering collaborative knowledge-intensive processes through e-mail mining
1466 -- 1479Pedro Antunes, David Simões, Luís Carriço, José A. Pino. An end-user approach to business process modeling
1480 -- 1488Rahat Iqbal, Nazaraf Shah, Anne E. James, Tomasz Cichowicz. Integration, optimization and usability of enterprise applications
1489 -- 1502Leijie Fu, Pingyu Jiang, Wei Cao. Modeling and performance analysis of product development process network
1503 -- 1511Ta-Ping Lu, Amy J. C. Trappey, Yi-Kuang Chen, Yu-Da Chang. Collaborative design and analysis of supply chain network management key processes model
1512 -- 1522Yuan Cheng, Fazhi He, Xiantao Cai, Dejun Zhang. A group Undo/Redo method in 3D collaborative modeling systems with performance evaluation
1523 -- 1530JianCheng Shi, Jianhua Liu, Ruxin Ning, Weiwei Hou. A collisions evaluation method in virtual environment for collaborativeassembly
1531 -- 1539Bin Guo, Daqing Zhang, Zhu Wang, Zhiwen Yu, Xingshe Zhou. Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things
1540 -- 1550Yang Yang, Xinyu Li, Liang Gao, Xinyu Shao. A new approach for predicting and collaborative evaluating the cutting force in face milling based on gene expression programming
1551 -- 1565Jesús Gallardo, Ana I. Molina, Crescencio Bravo, Miguel A. Redondo. A model-driven and task-oriented method for the development of collaborative systems
1566 -- 1576María Blanca Ibáñez, José Jesús García Rueda, David Maroto, Carlos Delgado Kloos. Collaborative learning in multi-user virtual environments
1577 -- 1578Weiming Shen, Weidong Li. Collaboration computing technologies and applications
1579 -- 1588Dujuan Gu, Xiaohan Liu, Gang Qin, Shuangjian Yan, Ze Luo, Baoping Yan. VNET6: IPv6 virtual network for the collaboration between applications and networks
1589 -- 1598Anbazhagan Rajesh, Rangaswamy Nakkeeran. Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks
1599 -- 1609Yuanyuan Pan, Jianqing Li. Cooperative pseudonym change scheme based on the number of neighbors in VANETs
1610 -- 1619Damià Castellà Martínez, Francesc Giné, Francesc Solsona, Josep L. Lérida. Analyzing locality over a P2P computing architecture
1620 -- 1631Josep Rius Torrento, Fernando Cores, Francesc Solsona. Cooperative scheduling mechanism for large-scale peer-to-peer computing systems
1632 -- 1641Sheng-Cheng Yeh, Ming-Yang Su, Hui-Hui Chen, Chun-Yuen Lin. An efficient and secure approach for a cloud collaborative editing
1642 -- 1650Hongchen Wu, Xinjun Wang, Zhaohui Peng, Qingzhong Li. Div-clustering: Exploring active users for social collaborative recommendation
1651 -- 1659Li Ho Leung, Vincent T. Y. Ng. Discovering associations between news and contents in social network sites with the D-Miner service framework
1660 -- 1670Xiaogang Wang, Ming Yang, Junzhou Luo. A novel sequential watermark detection model for efficient traceback of secret network attack flows
1671 -- 1683Jian Jiang, Wei Li 0017, Junzhou Luo, Jing Tan. A network accountability based verification mechanism for detecting inter-domain routing path inconsistency
1684 -- 1695Junping Wang, QiLiang Zhu, Yan Ma. An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers
1696 -- 1704Wenfeng Li, Ye Zhong, Xun Wang, Yulian Cao. Resource virtualization and service selection in cloud logistics
1705 -- 1723Mojtaba Seyedzadegan, Mohamed Othman, Borhanuddin Mohd Ali, Shamala Subramaniam. Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks
1724 -- 1734Wu-Hsiao Hsu, Yuh-Pyng Shieh. Virtual network mapping algorithm in the cloud infrastructure
1735 -- 1752Juan Felipe Botero, Miguel Molina, Xavier Hesselbach-Serra, José Roberto Amazonas. A novel paths algebra-based strategy to flexibly solve the link mapping stage of VNE problems

Volume 36, Issue 5

1273 -- 1274Joel J. P. C. Rodrigues, Russel Hsing, Min Chen, Bingli Jiao, Binod Vaidya. Guest editorial on vehicular communications and applications
1275 -- 1286Claudia Campolo, Hector Agustin Cozzetti, Antonella Molinaro, Riccardo Scopigno. Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks
1287 -- 1294Yazhi Liu, Jianwei Niu, Jian Ma, Lei Shu, Takahiro Hara, Wendong Wang. The insights of message delivery delay in VANETs with a bidirectional traffic model
1295 -- 1307Ramon Bauza, Javier Gozálvez. Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications
1308 -- 1315Nitin Maslekar, Joseph Mouzna, Mounir Boussedjra, Houda Labiod. CATS: An adaptive traffic signal system based on car-to-car communication
1316 -- 1323Kai Lin. Research on adaptive target tracking in vehicle sensor networks
1324 -- 1336Nerea Toledo, Jean-Marie Bonnin, Marivi Higuero. Performance evaluation of user applications in the ITS scenario: An analytical assessment of the NeMHIP
1337 -- 1351Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juan Hernández-Serrano, Juanjo Alins. COACH: COllaborative certificate stAtus CHecking mechanism for VANETs
1352 -- 1364Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah. Privacy preserving broadcast message authentication protocol for VANETs
1365 -- 1371Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao. An enhanced smart card based remote user password authentication scheme
1372 -- 1386Hai Van Luu, Xueyan Tang. Constructing rings overlay for robust data collection in wireless sensor networks
1387 -- 1394Ting Chen, Xiaosong Zhang, Hong-yuan Li, Dong Wang, Yue Wu. Propagation modeling of active P2P worms based on ternary matrix
1395 -- 1402Sulma Rashid, Abdul Hanan Abdullah, Qaisar Ayub, M. Soperi Mohd Zahid. Dynamic Prediction based Multi Queue (DPMQ) drop policy for probabilistic routing protocols of delay tolerant network

Volume 36, Issue 4

1091 -- 1101Ebrahim Mahdipour, Amir Masoud Rahmani, Saeid Setayeshi. Importance sampling for Jackson networks with customer impatience until the end of service
1102 -- 1115Christophe Dumez, Mohamed Bakhouya, Jaafar Gaber, Maxime Wack, Pascal Lorenz. Model-driven approach supporting formal verification for web service composition protocols
1116 -- 1130Nader Mohamed, Jameela Al-Jaroodi, Abdulla Eid. A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud
1131 -- 1139Ammar Haider, Iqbal Gondal, Joarder Kamruzzaman. Social-connectivity-aware vertical handover for heterogeneous wireless networks
1140 -- 1151A. Cagatay Talay, D. Turgay Altilar. Self adaptive routing for dynamic spectrum access in cognitive radio networks
1152 -- 1163Jasone Astorga, Marina Aguado, Nerea Toledo, Marivi Higuero. A high performance link layer mobility management strategy for professional private broadband networks
1164 -- 1173Chien-Chao Tseng, Chia-Liang Lin, Li-Hsing Yen, Jyun-Yan Liu, Cheng-Yuan Ho. Can: A context-aware NAT traversal scheme
1174 -- 1185D. D. Geeta, N. Nalini, Rajashekhar C. Biradar. Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach
1186 -- 1195Chao-Yang Lee, Liang-Cheng Shiu, Fu-Tian Lin, Chu-Sing Yang. Distributed topology control algorithm on broadcasting in wireless sensor network
1196 -- 1207El-Sayed M. El-Alfy, Syed N. Mujahid, Shokri Z. Selim. A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks
1208 -- 1218Ying-Dar Lin, Cheng-Yuan Ho, Yuan-Cheng Lai, Tzu-Hsiung Du, Shun-Lee Chang. Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems
1219 -- 1229Anwar Saif, Mohamed Othman. SRA-MSDU: Enhanced A-MSDU frame aggregation with selective retransmission in 802.11n wireless networks
1230 -- 1242Muhammad Hamad Alizai, Hanno Wirtz, Bernhard Kirchen, Klaus Wehrle. Portable wireless-networking protocol evaluation
1243 -- 1260Mohammad Masdari, Sadegh Mohammadzadeh Bazarchi, Moazam Bidaki. Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks
1261 -- 1271Aishwarya Bakshi, Amir Talaei-Khoei, Pradeep Ray. Adaptive policy framework: A systematic review

Volume 36, Issue 3

959 -- 960Joel J. P. C. Rodrigues, Russel Hsing, Min Chen, Bingli Jiao, Binod Vaidya. Guest Editorial on Vehicular Networking Protocols
961 -- 973António Fonseca, Teresa Vazão. Applicability of position-based routing for VANET in highways and urban environment
974 -- 980Rajashree Nair, Ben Soh, Naveen K. Chilamkurti, Jong Hyuk Park. Structure-free message aggregation and routing in traffic information system (SMART)
981 -- 991Salim Bitam, Abdelhamid Mellouk. Bee life-based multi constraints multicast routing optimization for vehicular ad hoc networks
992 -- 1000Zhenxia Zhang, Azzedine Boukerche, Hussam M. Soliman Ramadan. Design and evaluation of a fast MAC layer handoff management scheme for WiFi-based multichannel Vehicular Mesh Networks
1001 -- 1007Angelos Antonopoulos, Charalabos Skianis, Christos V. Verikoukis. Network coding-based cooperative ARQ scheme for VANETs
1008 -- 1017Navid Tadayon, Sasan Khoshroo, Elaheh Askari, Honggang Wang, Howard Michel. Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis
1018 -- 1026Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Xingang Liu. Performance improvement of QO-STBC over time-selective channel for wireless network
1027 -- 1038Jaime Lloret, Alejandro Canovas, Angel Catala, Miguel Garcia. Group-based protocol and mobility model for VANETs to offer internet access
1039 -- 1049Md. Humayun Kabir, Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman. Efficient route optimization scheme for nested-NEMO
1050 -- 1056Liren Zhang, Abderrahmane Lakas, Hesham El-Sayed, Ezedin Barka. Mobility analysis in vehicular ad hoc network (VANET)
1057 -- 1069Yejun Liu, Qingyang Song, Rui Ma, Bing Li, Bo Gong. Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network
1070 -- 1077Jian-Zhen Luo, Shun-Zheng Yu. Position-based automatic reverse engineering of network protocols
1078 -- 1090Masoud Zarifneshat, Pejman Khadivi. Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models

Volume 36, Issue 2

567 -- 581Bingdong Li, Jeff Springer, George Bebis, Mehmet Hadi Gunes. A survey of network flow applications
582 -- 592Shams Qazi, Raad Raad, Yi Mu, Willy Susilo. Securing DSR against wormhole attacks in multirate ad hoc networks
593 -- 610Ahmed Hassan Mohammed, Bin Dai, Benxiong Huang, Muhammad Azhar Iqbal, Guan Xu, Peng Qin, Shui Yu. A survey and tutorial of wireless relay network protocols based on network coding
611 -- 622Xiaobing He, Michael Niedermeier, Hermann de Meer. Dynamic key management in wireless sensor networks: A survey
623 -- 645Sudhanshu Tyagi, Neeraj Kumar. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
646 -- 656Rafiqul Islam, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg. Classification of malware based on integrated static and dynamic features
657 -- 666Kun Huang, Gaogang Xie, Rui Li, Shuai Xiong. Fast and deterministic hash table lookup using discriminative bloom filters
667 -- 676Chiapin Wang. Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach
677 -- 684Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro. Windows Mobile LiveSD Forensics
685 -- 697Sardar Muhammad Bilal, Carlos Jesus Bernardos, Carmen Guerrero. Position-based routing in vehicular networks: A survey
698 -- 710Mathias Kretschmer, Philipp Batroff, George Ghinea. Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies
711 -- 722Najme Mansouri, Gholamhosein Dastghaibyfard, Ehsan Mansouri. Combination of data replication and scheduling algorithm for improving data availability in Data Grids
723 -- 737Dimitris C. Vasiliadis, George E. Rizos, Costas Vassilakis. Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing traffic
738 -- 743Shiliang Luo, Xu Lu, Lianglun Cheng. TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of Things
744 -- 755Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
756 -- 767Kuang-Yow Lian, Sung-Jung Hsiao, Wen-Tsai Sung. Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks
768 -- 780Po-Ching Lin, Jia-Hau Lee. Re-examining the performance bottleneck in a NIDS with detailed profiling
781 -- 790Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu 0005, Sushil Jajodia. Quantitative survivability evaluation of three virtual machine-based server architectures
791 -- 798C. Xu, C. Du, G. F. Zhao, S. Yu. A novel model for user clicks identification based on hidden semi-Markov
799 -- 810Jian An, Xiaolin Gui, Wendong Zhang, Jinghua Jiang, Jianwei Yang. Research on social relations cognitive model of mobile nodes in Internet of Things
811 -- 817Yanheng Liu, Longxiang Suo, Dayang Sun, Aimin Wang. A virtual square grid-based coverage algorithm of redundant node for wireless sensor network
818 -- 828Peng Xiao, Zhigang Hu, Dongbo Liu, Guofeng Yan, Xilong Qu. Virtual machine power measuring technique with bounded error in cloud environments
829 -- 842Gaik-Yee Chan, Chien-Sing Lee, Swee-Huay Heng. Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks
843 -- 857Yuhuai Peng, Yao Yu, Lei Guo, Dingde Jiang, Qiming Gai. An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks
858 -- 869Shahram Jamali, Seyyed Nasser Seyyed Hashemi, Amir-Masoud Eftekhari-Moghadam. On the use of a full information feedback to stabilize RED
870 -- 880Abraham Martín-Campillo, Jon Crowcroft, Eiko Yoneki, Ramon Martí. Evaluating opportunistic networks in disaster scenarios
881 -- 886Mahesh Kumar, Shishir Kumar. AGRIB-BHF: A sustainable and fault tolerant aggregation
887 -- 897Mahmoud Al-shugran, Osman Ghazali, Suhaidi Hassan, Kashif Nisar, A. Suki M. Arif. A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network
898 -- 907Laisen Nie, Dingde Jiang, Lei Guo. A power laws-based reconstruction approach to end-to-end network traffic
908 -- 926Enver Ever, Orhan Gemikonakli, Altan Koçyigit, Eser Gemikonakli. A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues
927 -- 932Hu Xiong, Zhong Chen, Fagen Li. New identity-based three-party authenticated key agreement protocol with provable security
933 -- 948Kashif Nisar, Angela Amphawan, Suhaidi Hassan, Nurul I. Sarkar. A comprehensive survey on scheduler for VoIP over WLAN
949 -- 958Mohamed K. Watfa, Haitham Al-Hassanieh, Samir Salmen. A novel solution to the energy hole problem in sensor networks

Volume 36, Issue 1

1 -- 15Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal, Henry L. Owen. Wireless sensor networks for rehabilitation applications: Challenges and opportunities
16 -- 24Hung-Jen Liao, Chun-Hung Richard Lin, Ying Chih Lin, Kuang-Yuan Tung. Intrusion detection system: A comprehensive review
25 -- 41Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior. An intrusion detection and prevention system in cloud computing: A systematic review
42 -- 57Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan. A survey of intrusion detection techniques in Cloud
58 -- 65Fadoua Mhiri, Kaouthar Sethom, Ridha Bouallegue. A survey on interference management techniques in femtocell self-organizing networks
66 -- 76Md. Mahedi Hassan, Poo Kuan Hoong. Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain
77 -- 90Rodrigo Palucci Pantoni, Dennis Brandão. A gradient based routing scheme for street lighting wireless sensor networks
91 -- 102D. Satish kumar, N. Nagarajan. Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks
103 -- 125Christos Emmanouilidis, Remous-Aris Koutsiamanis, Aimilia Tasidou. Mobile guides: Taxonomy of architectures, context awareness, technologies and applications
126 -- 133Saleem-Ullah Lar, Xiaofeng Liao. An initiative for a classified bibliography on TCP/IP congestion control
134 -- 146A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar. Wireless Sensor Network transport protocol: A critical review
147 -- 155Slimane Bah, Roch H. Glitho, Rachida Dssouli. A SIP servlets-based framework for service provisioning in stand-alone MANETs
156 -- 166Seung Wan Han, In-Seon Jeong, Seung-Ho Kang. Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks
167 -- 177Junjie Xiong, Yangfan Zhou, Michael R. Lyu, Evan F. Y. Young. MDiag: Mobility-assisted diagnosis for wireless sensor networks
178 -- 186Wen Tao Zhu. Towards secure and communication-efficient broadcast encryption systems
187 -- 194Bing Hu 0002, Kwan L. Yeung, Zhaoyang Zhang 0001. An efficient single-iteration single-bit request scheduling algorithm for input-queued switches
195 -- 210Kemal Akkaya, Izzet F. Senturk, Shanthi Vemulapalli. Handling large-scale node failures in mobile sensor/robot networks
211 -- 218Zhan-feng Wang, Ming Chen 0003, Chang-you Xing, Jing Feng, Xianglin Wei, Huali Bai. Multi-manifold model of the Internet delay space
219 -- 227Jeroen Famaey, Frédéric Iterbeke, Tim Wauters, Filip De Turck. Towards a predictive cache replacement strategy for multimedia content
228 -- 234Huan Dai, Zhao-min Zhu, Xiao-Feng Gu. Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network
235 -- 248Adeela Waqar, Asad Raza, Haider Abbas, Muhammad Khurram Khan. A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata
249 -- 254Pekka Jäppinen, Renata Guarneri, Luis M. Correia. An applications perspective into the Future Internet
255 -- 261Isabel de la Torre Díez, Saúl Álvaro-Muñoz, Miguel López Coronado, Joel J. P. C. Rodrigues. Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT
262 -- 273Marjan Naderan Tahan, Mehdi Dehghan, Hossein Pedram. Sensing task assignment via sensor selection for maximum target coverage in WSNs
274 -- 283Reinaldo Bezerra Braga, Igor A. Chaves, Carina Teixeira De Oliveira, Rossana M. C. Andrade, José Neuman de Souza, Hervé Martin, Bruno Schulze. RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments
284 -- 292Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, Yi-Lang Tsai. A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs
293 -- 305Minwoo Kim, Karam Park, Won Woo Ro. Benefits of using parallelized non-progressive network coding
306 -- 315Ting Yang, Yugeng Sun, Javid Taheri, Albert Y. Zomaya. DLS: A dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks
316 -- 323Kaiping Xue, Changsha Ma, Peilin Hong, Rong Ding. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
324 -- 335Rafiqul Islam, Jemal Abawajy. A multi-tier phishing detection and filtering approach
336 -- 352Vishnu Monn Baskaran, Yoong Choon Chang, Jonathan Loo, KokSheik Wong. Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing
353 -- 367Mingfu Li, Yueh-Lin Wu, Chia-Rong Chang. Available bandwidth estimation for the network paths with multiple tight links and bursty traffic
368 -- 377Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed Ibnkahla. Quantifying connectivity in wireless sensor networks with grid-based deployments
378 -- 387Xun Yi, Eiji Okamoto. Practical Internet voting system
388 -- 401Yuehua Wang, Zhong Zhou, Ling Liu, Wei Wu. Replica-aided load balancing in overlay networks
402 -- 408Domenico Rosaci, Giuseppe M. L. Sarnè. Cloning mechanisms to improve agent performances
409 -- 419M. Hooshmand, S. Mohamad R. Soroushmehr, Pejman Khadivi, Shadrokh Samavi, Shahram Shirani. Visual sensor network lifetime maximization by prioritized scheduling of nodes
420 -- 428Weigang Hou, Lei Guo, Xiaoxue Gong. Survivable power efficiency oriented integrated grooming in green networks
429 -- 443Jesús L. Alvaro, Beatriz Barros. A new cloud computing architecture for music composition
444 -- 451I-Hsuan Peng, Yen-Wen Chen. Energy consumption bounds analysis and its applications for grid based wireless sensor networks
452 -- 465Khaled Salah, Mohamed Hamawi. Performance of IP-forwarding of Linux hosts with multiple network interfaces
466 -- 475Imran Baig, Muhammad Ayaz, Varun Jeoti. On the peak-to-average power ratio reduction in mobile WiMAX: A discrete cosine transform matrix precoding based random-interleaved orthogonal frequency division multiple access uplink system
476 -- 483Mary Looney, Oliver Gough. A provision aware proportional fair sharing three colour marker
484 -- 497María-Victoria Belmonte, Manuel Díaz, José-Luis Pérez-de-la-Cruz, Ana Reyna. COINS: COalitions and INcentiveS for effective Peer-to-Peer downloads
498 -- 503Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang. An novel three-party authenticated key exchange protocol using one-time key
504 -- 522Eugénia Moreira Bernardino, Anabela Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido, Miguel A. Vega-Rodríguez. Swarm optimisation algorithms applied to large balanced communication networks
523 -- 532Haythem Bany Salameh, Osamah S. Badarneh. Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks
533 -- 542Ting Yi Chang, Yan-Ru Ke. A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system
543 -- 565Sepideh Adabi, Ali Movaghar, Amir Masoud Rahmani, Hamid Beigy. Market_based grid resource allocation using new negotiation model