default search action
Journal of Network and Computer Applications, Volume 68
Volume 68, June 2016
- Nauman Ahad, Junaid Qadir, Nasir Ahsan:
Neural networks in wireless networks: Techniques, applications and guidelines. 1-27 - Maxim Claeys, Daphné Tuncer, Jeroen Famaey, Marinos Charalambides, Steven Latré, George Pavlou, Filip De Turck:
Hybrid multi-tenant cache management for virtualized ISP networks. 28-41 - Anum Ali, Ghalib A. Shah, Junaid Arshad:
Energy efficient techniques for M2M communication: A survey. 42-55 - Zhiming Wang, Xiaoping Zeng, Xue Liu, Man Xu, Ya Wen, Li Chen:
TCP congestion control algorithm for heterogeneous Internet. 56-64 - Yunhe Cui, Lianshan Yan, Saifei Li, Huanlai Xing, Wei Pan, Jian Zhu, Xiaoyang Zheng:
SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. 65-79 - Han-Peng Jiang, David Chuck, Wei-Mei Chen:
Energy-aware data center networks. 80-89 - Aisha Abdallah, Mohd Aizaini Maarof, Anazida Zainal:
Fraud detection system: A survey. 90-113 - Tran The Son, Hoa Le Minh, Nauman Aslam:
MSAR: A metric self-adaptive routing model for Mobile Ad Hoc Networks. 114-125 - Wenjuan Li, Weizhi Meng, Lam-for Kwok:
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. 126-139 - Yang Qin, Weihong Yang, Yibin Ye, Yao Shi:
Analysis for TCP in data center networks: Outcast and Incast. 140-150 - Wenbin Hu, Zhenyu Qiu, Huan Wang, Liping Yan:
A Real-time scheduling algorithm for on-demand wireless XML data broadcasting. 151-163 - Bijoy Chand Chatterjee, Waya Fadini, Eiji Oki:
A spectrum allocation scheme based on first-last-exact fit policy for elastic optical networks. 164-172 - Syed Hamid Hussain Madni, Muhammad Shafie Abdul Latif, Yahaya Coulibaly, Shafii Muhammad Abdulhamid:
Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities. 173-200 - Weizhi Meng, Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan:
JuiceCaster: Towards automatic juice filming attacks on smartphones. 201-212 - P. V. Bindu, P. Santhi Thilagam:
Mining social networks for anomalies: Methods and challenges. 213-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.