default search action
Peer-to-Peer Networking and Applications, Volume 9
Volume 9, Number 1, January 2016
- Francisco Henrique, Ana Paula Couto da Silva, Alex Borges Vieira:
Characterizing peers communities and dynamics in a P2P live streaming system. 1-15 - Yen-Wen Chen, Po-Ying Liao, Ying-Cheng Wang:
A channel-hopping scheme for continuous rendezvous and data delivery in cognitive radio network. 16-27 - Xiaotong Wu, Meng Liu, Wan-Chun Dou, Longxiang Gao, Shui Yu:
A scalable and automatic mechanism for resource allocation in self-organizing cloud. 28-41 - Eunhye Kim, Roger P. Karrer, Ju-Won Park, Sehun Kim:
A novel fairness-aware parallel download scheme. 42-53 - Jehn-Ruey Jiang, Jih-Wei Wu, Chi-Wen Fann, Jie-Yi Wu:
Immersive voice communication for massively multiplayer online games. 54-66 - Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang:
NetSecCC: A scalable and fault-tolerant architecture for cloud computing security. 67-81 - Mohammad Sabzinejad Farash:
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. 82-91 - Ping He, Hong Shen, Yidong Li:
Tree-based data retrieval algorithm for multi-item request with deadline in wireless networks. 92-107 - Liping Zhang, Shanyu Tang, Shaohui Zhu:
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. 108-126 - Xianfu Meng, Jing Jin:
A free rider aware topological construction strategy for search in unstructured P2P networks. 127-141 - Yingwu Zhu:
Towards bandwidth-efficient keyword continuous query processing over DHTs. 142-158 - U. Venkanna, R. Leela Velusamy:
TEA-CBRP: Distributed cluster head election in MANET by using AHP. 159-170 - Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. 171-192 - Harisankar Haridas, Janakiram Dharanipragada:
CAPS: A cloud-assisted approach to handle spikes in peer-to-peer web search. 193-208 - Maria Luisa Merani, Laura Natali, Cettina Barcellona:
An IP-TV P2P streaming system that improves the viewing quality and confines the startup delay of regular audience. 209-222 - Ashok Kumar Das:
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. 223-244 - Zhixin Liu, Panpan Wang, Yuanqing Xia, Hongjiu Yang, Xinping Guan:
Chance-constraint optimization of power control in cognitive radio networks. 245-253
Volume 9, Number 2, March 2016
- Xianfu Meng, Dongxu Liu:
A traffic-efficient message forwarding approach in unstructured P2P networks. 255-265 - Yung-Ting Chuang, Peter Michael Melliar-Smith, Louise Elizabeth Moser, Isai Michel Lombera:
Maintaining censorship resistance in the iTrust network for publication, search and retrieval. 266-283 - Yang Zong-chang:
Modeling and forecasting of daily online-user movement in instant messaging based on the elliptic-orbit model: A case study for China. 284-298 - Gi Seok Park, Hwangjun Song:
A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement. 299-312 - Antonio Delgado Peris, José M. Hernández, Eduardo Huedo:
Evaluation of alternatives for the broadcast operation in Kademlia under churn. 313-327 - Vineet Nagrath, Olivier Morel, Aamir Saeed Malik, Mohammed Naufal bin Mohamad Saad, Fabrice Mériaudeau:
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems. 328-343 - Zied Trifa, Maher Khemakhem:
A novel replication technique to attenuate churn effects. 344-355 - Nadir Shah, Ayaz Ahmad, Babar Nazir, Depei Qian:
A cross-layer approach for partition detection at overlay layer for structured P2P in MANETs. 356-371 - Xinxin Liu, Shaohua Tang, Shiqian Chen:
A description logic-based policy compliance checker for trust negotiation. 372-383 - Chong Lou, Weihua Zhuang:
Energy-efficient routing over coordinated sleep scheduling in wireless ad hoc networks. 384-396 - Daniel Kraft:
Difficulty control for blockchain-based consensus systems. 397-413 - Xiaolong Li, Meiping Peng, Jun Cai, Changyan Yi, Hong Zhang:
OPNET-based modeling and simulation of mobile Zigbee sensor networks. 414-423 - Tao Qin, Lei Wang, Dan Zhao, Min Zhu:
CUFTI: Methods for core users finding and traffic identification in P2P systems. 424-435 - Minoo Kargar Bideh, Behzad Akbari, Abdollah Ghaffari Sheshjavani:
Adaptive content-and-deadline aware chunk scheduling in mesh-based P2P video streaming. 436-448 - Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A secure and efficient mutual authentication scheme for session initiation protocol. 449-459
Volume 9, Number 3, May 2016
- Sun-Moon Jo, Gui-Jung Kim, Jung-Soo Han:
Convergence P2P context awareness. 461-464 - Hyesung Ji, Kinam Park, Jaechoon Jo, Heuiseok Lim:
Mining students activities from a computer supported collaborative learning system based on peer to peer network. 465-476 - Seokhoon Kim, Jinweon Suk:
Efficient peer-to-peer context awareness data forwarding scheme in emergency situations. 477-486 - GuoZhong Li, Eun-Mi Park, Seong-Taek Park:
Effects of social media usage on country image and purchase intention from social P2P network perspective. 487-497 - Hyun Mi Jung, Il-Sun Hwang, Jeong-Kyung Moon, Hark-Soo Park:
A security monitoring method for malicious P2P event detection. 498-507 - Cheol-Joo Chae, Yongju Shin, Kiseok Choi, Ki-Bong Kim, Kwang-Nam Choi:
A privacy data leakage prevention method in P2P networks. 508-519 - Hangki Joh, Inhwan Yang, Intae Ryoo:
The internet of everything based on energy efficient P2P transmission technology with Bluetooth low energy. 520-528 - Ho-Kyung Yang, Hyun-Jong Cha, Yong-Ho Kim:
mVoIP for P2P service based authentication system using AA authentication server. 529-538 - Woo-Sik Bae:
Designing and verifying a P2P service security protocol in M2M environment. 539-545 - Hoill Jung, Kyung-Yong Chung:
P2P context awareness based sensibility design recommendation using color and bio-signal analysis. 546-557 - Hyun-Jong Cha, Ho-Kyung Yang, Yong-Ho Kim:
A node management scheme for stable P2P service in mobile ad-hoc networks. 558-565 - Kyung-Yong Chung, Roy C. Park:
P2P cloud network services for IoT based disaster situations information. 566-577 - Hwan-Seok Yang, Jae Hoon Sun:
A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P. 578-587 - Jong Tak Kim, Hee-Jun Pan, Jonghun Kim:
P2P-based u-health cluster service model for silver generation in PBR platform. 588-598 - Kun Lu, Junlong Wang, Mingchu Li:
An Eigentrust dynamic evolutionary model in P2P file-sharing systems. 599-612
Volume 9, Number 4, July 2016
- Mianxiong Dong, Fen Hou, Peng Cheng, Kyoung-Sook Kim:
Guest editorial: Special issue on crowd sensing networks. 613-615 - Xiaoheng Deng, Lifang He, Xu Li, Qiang Liu, Lin Cai, Zhigang Chen:
A reliable QoS-aware routing scheme for neighbor area network in smart grid. 616-627 - Yeonsu Jung, Yunju Baek:
Multi-hop data forwarding method for crowd sensing networks. 628-639 - Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
CLEVER: Cluster-based Energy-aware Virtual Ring Routing in randomly deployed wireless sensor networks. 640-655 - Tingting Yang, Chengming Yang, Hailong Feng, Ruilong Deng:
Perceiving who and when to leverage data delivery for maritime networks: An optimal stopping view. 656-669 - Jingguo Ge, Shaojie Wang, Yulei Wu, Haina Tang, Yuepeng E:
Performance improvement for source mobility in named data networking based on global-local FIB updates. 670-680 - Kaimin Wei, Song Guo, Xiangli Li, Deze Zeng, Ke Xu:
Congestion control in social-based sensor networks: A social network perspective. 681-691 - Xiao Liu, Kaoru Ota, Anfeng Liu, Zhigang Chen:
An incentive game based evolutionary model for crowd sensing networks. 692-711 - Qichao Xu, Zhou Su, Bo Han, Dongfeng Fang, Zejun Xu, Xiaoying Gan:
Analytical model with a novel selfishness division of mobile nodes to participate cooperation. 712-720 - Thejaswini M, Pachamuthu Rajalakshmi, Uday B. Desai:
Duration of stay based weighted scheduling framework for mobile phone sensor data collection in opportunistic crowd sensing. 721-730 - Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria:
Top-k query processing in mobile-P2P networks using economic incentive schemes. 731-751 - Weidong Yang, Yunhua He, Limin Sun, Xiang Lu, Xinghua Li:
An optimal query strategy for protecting location privacy in location-based services. 752-761 - Hongwei Li, Kun Jia, Haomiao Yang, Dongxiao Liu, Liang Zhou:
Practical blacklist-based anonymous authentication scheme for mobile crowd sensing. 762-773 - Jun Zhou, Zhenfu Cao, Xiaolei Dong:
Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. 774-794 - Mohammed El-Amine Cheriet, Mohamed Ouslim, Boualam Belaidi:
The implementation of indoor localization based on an experimental study of RSSI using a wireless sensor network. 795-808
Volume 9, Number 5, September 2016
- Haider Abbas, Sana Ullah, Sudip Misra, Yuh-Shyan Chen:
Guest editorial: Secure cloud computing for mobile health services. 809-811 - Ramzi A. Haraty, Mirna Zbib, Mehedi Masud:
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. 812-823 - Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal:
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. 824-840 - Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah Sharaf Alghamdi:
Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification. 841-853 - Yongjun Ren, Jian Shen, Yuhui Zheng, Jin Wang, Han-Chieh Chao:
Efficient data integrity auditing for storage security in mobile health cloud. 854-863 - Meiyu Huang, Yiqiang Chen, Bo-Wei Chen, Junfa Liu, Seungmin Rho, Wen Ji:
A semi-supervised privacy-preserving clustering algorithm for healthcare. 864-875 - Jaime Lloret, Sandra Sendra, José Miguel Jiménez, Lorena Parra:
Providing security and fault tolerance in P2P connections between clouds for mHealth services. 876-893 - Sk. Md. Mizanur Rahman, Md. Mehedi Masud, M. Anwar Hossain, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan, Atif Alamri:
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. 894-909 - Young-June Choi, Alexander W. Min, Zhetao Li:
Guest editorial: Special issue on device-to-device service and network management for beyond 4G mobile networks. 910-912 - Jongwoo Hong, Seungil Park, Sunghyun Choi:
Novel power control and collision resolution schemes for device-to-device discovery. 913-922 - Wenjun Xu, Shengyu Li, Yue Xu, Xuehong Lin:
Underlaid-D2D-assisted cooperative multicast based on social networks. 923-935 - Fu Xiao, Xiaohui Xie, Zhifei Jiang, Lijuan Sun, Ruchuan Wang:
Utility-aware data transmission scheme for delay tolerant networks. 936-944 - Shijie Sun, Kwang-Yul Kim, Oh-Soon Shin, Yoan Shin:
Device-to-device resource allocation in LTE-advanced networks by hybrid particle swarm optimization and genetic algorithm. 945-954 - Do-Yun Kim, Young-June Choi:
Cooperative device discovery for multi-interface self-organizing networks. 955-964 - Hieu Van Nguyen, Quang Duong, Van-Dinh Nguyen, Yoan Shin, Oh-Soon Shin:
Optimization of resource allocation for underlay device-to-device communications in cellular networks. 965-977
Volume 9, Number 6, November 2016
- S. Rajkumar, Neeraj Kumar Goyal:
Reliable multistage interconnection network design. 979-990 - Wail Mardini, Yaser M. Khamayseh, Abedl Rahman Almodawar, Ehab S. Elmallah:
Adaptive RSSI-based localization scheme for wireless sensor networks. 991-1004 - Zhi-yuan Li, Lu Liu, Rulong Chen, Jun-lei Bi:
An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. 1005-1019 - Qiyi Han, Hong Wen, Gang Feng, Bin Wu, Mengyin Ren:
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. 1020-1030 - Michele Amoretti, Carlos Gershenson:
Measuring the complexity of adaptive peer-to-peer systems. 1031-1046 - Peng Qin, Bin Dai, Guan Xu, Kui Wu, Benxiong Huang:
Taking a free ride for routing topology inference in peer-to-peer networks. 1047-1059 - Bo Zhang, S.-H. Gary Chan:
Overlay construction for mobile peer-to-peer video broadcasting - Approaches and comparisons. 1060-1073 - Müge Sayit, Sercan Demirci, Yagiz Kaymak, Emrullah Turhan Tunali:
Adaptive, incentive and scalable dynamic tree overlay for P2P live video streaming. 1074-1088 - Yi Zheng, Fuhong Lin, Yansong Yang, Tong Gan:
Adaptive resource scheduling mechanism in P2P file sharing system. 1089-1100 - Ruchir Gupta, Nitin Singha, Yatindra Nath Singh:
Reputation based probabilistic resource allocation for avoiding free riding and formation of common interest groups in unstructured P2P networks. 1101-1113 - Chow-Sing Lin, Jhe-Wei Lin:
UR-aware: Streaming videos over BitTorrent with balanced playback urgency and rareness distribution. 1114-1125 - Laura Ricci, Alexandru Iosup, Radu Prodan:
Large scale distributed cooperative environments on clouds and P2P. 1126-1127 - Alireza Naghizadeh, Behrooz Razeghi, Ehsan Meamari, Majid Hatamian, Reza Ebrahimi Atani:
C-trust: A trust management system to improve fairness on circular P2P networks. 1128-1144 - Radu Prodan, Alexandru Iosup:
Operation analysis of massively multiplayer online games on unreliable resources. 1145-1161 - Maria Efthymiopoulou, Nikolaos Efthymiopoulos, Athanasios Christakidis, Nikolaos Athanasopoulos, Spyros G. Denazis, Odysseas G. Koufopavlou:
Scalable playback rate control in P2P live streaming systems. 1162-1176 - Barbara Guidi, Tobias Amft, Andrea De Salve, Kalman Graffi, Laura Ricci:
DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks. 1177-1194 - Valerio Arnaboldi, Massimiliano La Gala, Andrea Passarella, Marco Conti:
Information diffusion in distributed OSN: The impact of trusted relationships. 1195-1208 - Shree Garg, Sateesh Kumar Peddoju, Anil Kumar Sarje:
Scalable P2P bot detection system based on network data stream. 1209-1225 - Michele Amoretti, Alessandro Grazioli, Francesco Zanichelli:
An autonomic approach for P2P/cloud collaborative environments. 1226-1241 - Moulay Driss Mechaoui, Nadir Guetmi, Abdessamad Imine:
MiCa: Lightweight and mobile collaboration across a collaborative editing service in the cloud. 1242-1269 - Stefano Ferretti:
Self-healing protocols for connectivity maintenance in unstructured overlays. 1270-1292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.