


default search action
Journal of Network and Computer Applications, Volume 31
Volume 31, Number 1, January 2008
- Hsu-Yang Kung, Hao-Hsiang Ku, Che-I Wu, Ching-Yu Lin:

Intelligent and situation-aware pervasive system to support debris-flow disaster prediction and alerting in Taiwan. 1-18 - Mosaab Daoud

, Qusay H. Mahmoud
:
Monte Carlo simulation-based algorithms for estimating the reliability of mobile agent-based systems. 19-31 - Xiao Qin

:
Performance comparisons of load balancing algorithms for I/O-intensive workloads on clusters. 32-46 - Ming-Tsung Chen, Bertrand M. T. Lin

, Shian-Shyong Tseng:
Multicast routing and wavelength assignment with delay constraints in WDM networks with heterogeneous capabilities. 47-65
- Tushar M. Raste, D. B. Kulkarni:

Design and implementation scheme for deploying IPv4 over IPv6 tunnel. 66-72
Volume 31, Number 2, April 2008
- Christos Makris

, Athanasios K. Tsakalidis:
Trends in peer to peer and service oriented computing. 73-74 - Sinuhé Arroyo, Miguel-Ángel Sicilia

, José Manuel López Cobo:
Patterns of message interchange in decoupled hypermedia systems. 75-92 - Serena Pastore

:
The service discovery methods issue: A web services UDDI specification framework integrated in a grid environment. 93-107 - Vassiliki Diamadopoulou, Christos Makris

, Yannis Panagis
, Evangelos Sakkopoulos
:
Techniques to support Web Service selection and consumption with QoS characteristics. 108-130 - Konstantinos Votis

, Christos Alexakos
, Bill Vassiliadis
, Spiridon D. Likothanassis:
An ontologically principled service-oriented architecture for managing distributed e-government nodes. 131-148 - Spyros Sioutas, Evangelos Sakkopoulos

, Lambros Drossos
, Spiros Sirmakessis
:
Balanced distributed web service lookup system. 149-162 - Sampath N. Ranasinghe, Vasilis Friderikos

, Hamid Aghvami:
Dynamic proxy assisted mobility support for third generation peer-to-peer networks. 163-178 - Dimitris Kanellopoulos

, Alkiviadis A. Panagopoulos:
Exploiting tourism destinations' knowledge in an RDF-based P2P network. 179-200
Volume 31, Number 3, August 2008
- Gwo-Jong Yu, Chih-Yung Chang:

Congestion control of bluetooth radio system by piconet restructuring. 201-223 - Dhouha Ayed, Chantal Taconet, Guy Bernard, Yolande Berbers:

CADeComp: Context-aware deployment of component-based applications. 224-257 - Chunlin Li, Layuan Li:

Cross-layer optimization policy for QoS scheduling in computational grid. 258-284 - Lin Chen, Changjun Jiang, Junjie Li:

VGITS: ITS based on intervehicle communication networks and grid technology. 285-302 - Luhua Liao, Lemin Li, Sheng Wang:

Multicast protection scheme in survivable WDM optical networks. 303-316 - James Lembke

, Byung Kyu Choi:
Edge-limited scalable QoS flow set-up. 317-337 - Ferhat Khendek

, Tong Zheng:
Modeling and analysis of value added services using message sequence charts. 338-356
Volume 31, Number 4, November 2008
- Javier Varona

, Cristina Manresa-Yee
, Francisco José Perales López:
Hands-free vision-based interface for computer accessibility. 357-374 - Hongjun Liu, Ping Luo, Daoshun Wang:

A scalable authentication model based on public keys. 375-386 - Wen-Hwa Liao

, Yucheng Kao, Chien-Ming Fan:
Data aggregation in wireless sensor networks using ant colony algorithm. 387-401 - Vidhyacharan Bhaskar, Patrick Lallement:

Activity routing in a distributed supply chain: Performance evaluation with two inputs. 402-428 - Bing Zheng, Mohammed Atiquzzaman

:
A framework to determine bounds of maximum loss rate parameter of RED queue for next generation routers. 429-445 - K. Komathy, P. Narayanasamy:

Trust-based evolutionary game model assisting AODV routing against selfishness. 446-471 - Hongjun Liu, Ping Luo, Daoshun Wang:

A distributed expansible authentication model based on Kerberos. 472-486 - Carles Garrigues

, Sergi Robles
, Joan Borrell
:
Securing dynamic itineraries for mobile agent applications. 487-508 - Haïdar Safa, Mohamad Chouman, Hassan Artail, Marcel Karam:

A collaborative defense mechanism against SYN flooding attacks in IP networks. 509-534 - Prasan Kumar Sahoo

, Chih-Yung Chang, Sheng-Wen Chang:
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility. 535-558 - Weili Han, Xingdong Shi, Ronghua Chen:

Process-context aware matchmaking for web service composition. 559-576 - G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram:

An efficient resource allocation scheme for multimedia applications in MANET. 577-584 - Eric Gamess, Rina Surós:

An upper bound model for TCP and UDP throughput in IPv4 and IPv6. 585-602 - Yiouli Kritikou

, Panagiotis Demestichas
, Evgenia F. Adamopoulou
, Konstantinos P. Demestichas
, Michael E. Theologou, Maria Paradia:
User Profile Modeling in the context of web-based learning management systems. 603-627 - Venet Osmani, Sasitharan Balasubramaniam

, Dmitri Botvich:
Human activity recognition in pervasive health-care: Supporting efficient remote collaboration. 628-655 - Pejman Khadivi, Shadrokh Samavi, Terence D. Todd:

Multi-constraint QoS routing using a new single mixed metrics. 656-676 - Beatriz Prieto

, Fernando Tricas, Juan Julián Merelo Guervós
, Antonio Mora García
, Alberto Prieto
:
Visualizing the evolution of a web-based social network. 677-698 - Mouhammd Al-Kasassbeh

, Mo Adda
:
Analysis of mobile agents in network fault management. 699-711 - Janus S. Liang:

The troubleshooting task implementation in automotive chassis using virtual interactive technique and knowledge-based approach. 712-734 - Xiangyang Wang, Panpan Niu, Wei Qi:

A new adaptive digital audio watermarking based on support vector machine. 735-749 - Hussein Abdel-jaber

, Michael E. Woodward, Fadi A. Thabtah, Amer Abu-Ali:
Performance evaluation for DRED discrete-time queueing network analytical model. 750-770 - Yoke Chek Yee, Khong Neng Choong, Andy Lock Yen Low, S. W. Tan:

SIP-based proactive and adaptive mobility management framework for heterogeneous networks. 771-792 - Juan J. Samper, Pedro A. Castillo

, Lourdes Araujo
, Juan Julián Merelo Guervós
, Oscar Cordón
, Fernando Tricas:
NectaRSS, an intelligent RSS feed reader. 793-806 - Wen-Hwa Liao

, Hsiao-Hsien Wang:
An asynchronous MAC protocol for wireless sensor networks. 807-820 - Jianjun Zhang, Ling Liu, Lakshmish Ramaswamy, Calton Pu:

PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks. 821-850 - Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:

Secure DACS Scheme. 851-861 - Javed I. Khan, Sajid S. Shaikh:

Computing in social networks with relationship algebra. 862-878 - Ibrahim Özçelik

:
Interconnection of CAN segments through IEEE 802.16 wireless MAN. 879-890 - Bhuvan Urgaonkar, Prashant J. Shenoy

:
Cataclysm: Scalable overload policing for internet applications. 891-920 - Khaled Salah

, Prasad Calyam, M. I. Buhari
:
Assessing readiness of IP networks to support desktop videoconferencing using OPNET. 921-943 - Haibin Cai, Fang Pu, Runcai Huang, Qiying Cao

:
A novel ANN-based service selection model for ubiquitous computing environments. 944-965 - Eleni Georgiou, Marios D. Dikaiakos, Athena Stassopoulou:

On the properties of spam-advertised URL addresses. 966-985

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














