


default search action
Journal of Network and Computer Applications, Volume 87
Volume 87, June 2017
- Mohammed Atiquzzaman

:
Editorial: New Editors 2017. A1-A5 - Mohammad Masdari, Safiyyeh Ahmadzadeh:

A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. 1-19 - Bing Xiong, Kun Yang, Jinyuan Zhao, Keqin Li:

Robust dynamic network traffic partitioning against malicious attacks. 20-31 - Franciscus X. A. Wibowo, Mark A. Gregory

, Khandakar Ahmed
, Karina Mabell Gomez
:
Multi-domain Software Defined Networking: Research status and challenges. 32-45 - Ping Song, Yi Liu, Chi Liu, Depei Qian:

ParaFlow: Fine-grained parallel SDN controller for large-scale networks. 46-59 - Sisi Xiong, Yanjun Yao, Michael W. Berry, Hairong Qi, Qing Cao:

Frequent traffic flow identification through probabilistic bloom filter and its GPU-based acceleration. 60-72 - Rodolfo Stoffel Antunes

, Matheus B. Lehmann, Rodrigo B. Mansilha
, Luciano Paschoal Gaspary, Marinho P. Barcellos
:
NDNrel: A mechanism based on relations among objects to improve the performance of NDN. 73-86 - Bertrand Ducourthial, Stéphane Mottelet, Anthony Busson:

Improving fairness between close Wi-Fi access points. 87-99 - Chunlin Li, Jing Zhang, Youlong Luo:

Real-time scheduling based on optimized topology and communication traffic in distributed real-time computation platform of storm. 100-115 - Muhammad Faran Majeed

, Matthew N. Dailey
, Riaz Khan, Apinun Tunpan:
Pre-caching: A proactive scheme for caching video traffic in named data mesh networks. 116-130 - Reza Farrahi Moghaddam, Vahid Asghari, Fereydoun Farrahi Moghaddam, Yves Lemieux, Mohamed Cheriet:

A Monte-Carlo approach to lifespan failure performance analysis of the network fabric in modular data centers. 131-146 - Saeed Kargar

, Leili Mohammad Khanli
:
Fractal: An advanced multidimensional range query lookup protocol on nested rings for distributed systems. 147-168 - Animesh Roy

, Soumit Bose, Tamaghna Acharya, Sipra Das Bit
:
Social-based energy-aware multicasting in delay tolerant networks. 169-184 - Waqas Haider, Jiankun Hu

, Jill Slay
, Benjamin P. Turnbull
, Yi Xie:
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. 185-192 - David Nuñez, Isaac Agudo, Javier López:

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation. 193-209 - Peng Liu, Biao Xu, Guojun Dai, Zhen Jiang, Jie Wu:

MDP: Minimum delay hot-spot parking. 210-222 - Arun I. B, T. G. Venkatesh:

Design and performance analysis of a MAC protocol for wireless LANs supporting multipacket reception. 223-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














