


default search action
International Journal of Communication Networks and Distributed Systems, Volume 13
Volume 13, Number 1, 2014
- Po-Jen Chuang, Teng-Tai Hu:

BHAR: a bidirectional hierarchy-based anycast routing protocol for wireless sensor networks. 1-24 - Mohamed Guesmia, Mustapha Guezouri

, Nader Mbarek:
A new media access control layer quality of service multicast scheme for IEEE 802.11s-based wireless mesh networks. 25-42 - Nianlong Jia, Wenjiang Feng, Yuanchang Zhong:

Relay zone-based cooperative relaying in multi-user wireless networks. 43-55 - Linda Zeghache, Nadjib Badache, Michel Hurfin, Izabela Moise:

Reliable mobile agents with transactional behaviour. 56-82 - S. Nithya Rekha, C. Chandrasekar

:
Energy efficient routing to reduce flooding in weighted rough set model using MANET. 83-105 - Arockia Xavier Annie Rayan

, Yogesh Palanichamy:
Effective VCR operations using efficient tree mechanism and scheduling for video streams in peer to peer networks. 106-118
Volume 13, Number 2, 2014
- K. P. Krishna Kumar, G. Geethakumari:

A taxonomy for modelling and analysis of diffusion of (mis)information in social networks. 119-143 - Sotirios Kontogiannis

, Alexandros Karakos:
ALBL: an adaptive load balancing algorithm for distributed web systems. 144-168 - Samant Saurabh, Sangita Roy

, Ashok Singh Sairam
:
Extended deterministic edge router marking. 169-186 - Anar Abdel-Hady

, Hossam M. A. Fahmy, Sherine M. Abd El-Kader
, Hussein Sherif Eissa, Ashraf E. Salem
:
Multilevel minimised delay clustering protocol for wireless sensor networks. 187-220 - Fayçal Bachtarzi, Allaoua Chaoui

:
A modelling language and a tool for web services composition. 221-240
Volume 13, Numbers 3/4, 2014
- Fang-Yie Leu, Fatos Xhafa, Aniello Castiglione, Yi-Li Huang:

Editorial. - Chundong Wang, Yu Zhang:

Situation evaluate on hierarchical network security based on D-S evidence theory. 245-256 - Rufen Huang, Qiang Nong:

Efficient certificate-based verifiable encrypted signature scheme. 257-267 - Chundong Wang, Chaoran Feng:

The application of dynamic password technology based on ECC algorithm in mobile payment. 268-276 - Fuw-Yi Yang, Ling-Ren Liang, Chun-Chin Hsu:

An improvement in strong designated verifier signatures. 277-289 - Qingxia Li, Wenhong Wei, Ming Tao, Qian Chen:

A DDOS defence scheme based on two-stage traffic flow control. 290-300 - Chijun Zhang, Tiezheng Sun, Zhanwei Du, Jialing Han:

Multi-access mixed cognitive body area network architecture. 301-313 - Chyi-Ren Dow, Yu-Hong Lee, Ruei-Yu Hu:

Adaptive SWE and SNMP-based sensor management for environmental monitoring. 314-334 - Xiaomao Chen, Shan Ouyang, Ziqiang Chen:

An energy aware resource allocation for cognitive radio OFDMA systems. 335-343 - Xiaoqing Tan

, Lianxia Jiang, Junpeng Hu:
Multiparty-controlled teleportation with generalised GHZ states in quantum communication network. 344-353 - Yuan-zhi He, Shu-yi Yin, Jingchao Wang:

In-orbit test and error analysis of shaped-reflector antenna pattern via satellite's attitude offset. 354-379 - Weiguo He:

Improved local binary pattern with pyramid model and its application in face recognition. 380-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














