default search action
Journal of Networks, Volume 1
Volume 1, Number 1, May 2006
- Joo Sang Youn, Jihoon Lee, Doo-Hyun Sung, Chul-Hee Kang:
Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks. 1-11 - Miao Yu, Jason H. Li, Renato Levy:
Mobility Resistant Clustering in Multi-Hop Wireless Networks. 12-19 - Benoît Latré, Pieter De Mil, Ingrid Moerman, Bart Dhoedt, Piet Demeester, Niek Van Dierdonck:
Throughput and Delay Analysis of Unslotted IEEE 802.15.4. 20-28 - Quan Le Trung, Gabriele Kotsis:
Issues in the Usage of MANETs as Backup or Load-Balancing Transit Networks of the Internet. 29-46 - Shidi Xu, Yi Mu, Willy Susilo:
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. 47-53 - Gang Lu, Gordon A. Manson, Demetrios Belis:
Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware. 54-63
Volume 1, Number 2, June 2006
- Soo-Chang Kim, Jong Chan Lee, Yeon-Seung Shin:
A Noble Fuzzy-based Mobile Tracking Scheme. 1-8 - Francisco J. Ros, Pedro M. Ruiz, Antonio Fernandez Gómez-Skarmeta:
Performance Evaluation of Interconnection Mechanisms for Ad Hoc Networks across Mobility Models. 9-17 - Bang Wang, Kee Chaing Chua, Vikram Srinivasan:
Localized Recursive Estimation in Energy Constrained Wireless Sensor Networks. 18-26 - Jerzy Konorski:
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations. 27-36 - Palaniandavar Venkateswaran, Rahul Ghosh, Aritra Das, Salil Kumar Sanyal, Rabindranath Nandi:
An Obstacle Based Realistic Ad-Hoc Mobility Model for Social Networks. 37-44 - Mikyung Kang, Junghoon Lee, Yongmoon Jin, Gyung-Leen Park, Hanil Kim:
Design of a Prioritized Error Control Scheme based on Load Differentiation for Time Sensitive Traffic on the Wireless LAN. 45-51
Volume 1, Number 3, July 2006
- Arunita Jaekel, Ying Chen:
Efficient Distributed Algorithm for RWA Using Path Protection. 1-8 - Tarun Bansal, Pankaj Ghanshani:
An EMST Based Look-up Protocol for Peer to Peer Networks. 9-17 - Soomi Yang:
An Efficient Role Specification Management Model for Highly Distributed Environments. 18-22 - Keiichi Shima, Yojiro Uo, Nobuo Ogashiwa, Satoshi Uda:
Operational Experiment of Seamless Handover of a Mobile Router using Multiple Care-of Address Registration. 23-30 - Rajesh Prasad, Hongyi Wu:
Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks. 31-39 - Robert Akl, Son Nguyen:
UMTS Capacity and Throughput Maximization for Different Spreading Factors. 40-49
Volume 1, Number 4, August 2006
- Luca Sanna Randaccio, Luigi Atzori:
A Genetic Algorithms Based Approach for Group Multicast Routing. 1-9 - Mohamed Khalil Watfa, Sesh Commuri:
An Energy Efficient Approach to Dynamic Coverage in Wireless Sensor Networks. 10-20 - Mehdi Sabeur, Badii Jouaber, Djamal Zeghlache:
Seamless Handoff Solution For Nested Mobile Networks. 21-28 - Bogdan-Florin Marin, Axel Hunger, Stefan Werner:
Corroborating Emotion Theory with Role Theory and Agent Technology: a Framework for Designing Emotional Agents as Tutoring Entities. 29-40 - Thavisak Manodham, Tetsuya Miki:
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP. 41-48
Volume 1, Number 5, September/October 2006
- Weijia Jia, Fung Po Tso, Lizhuo Zhang:
Efficient 3G324M protocol Implementation for Low Bit Rate Multipoint Video Conferencing. 1-8 - Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
802.11i Encryption Key Distribution Using Quantum Cryptography. 9-20 - Yih Huang, David Arsenault, Arun Sood:
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security. 21-30 - Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:
On Stochastic Modeling for Integrated Security and Dependability Evaluation. 31-42 - Mourad Elhadef, Shantanu Das, Amiya Nayak:
System-Level Fault Diagnosis Using Comparison Models: An Artificial-Immune-Systems-Based Approach. 43-53
Volume 1, Number 6, November/December 2006
- Alban Gabillon, Laurent Gallon:
Availability of ARINC 629 Avionic Data Bus. 1-9 - Muhammad Sher, Thomas Magedanz:
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS). 10-17 - Valer Bocan, Vladimir Cretu:
Threats and Countermeasures in GSM Networks. 18-27 - Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi:
Dependability Considerations in Wireless Sensor Networks Applications. 28-35 - Matthew John Leslie, Jim Davies, Todd Huffman:
A Comparison of Replication Strategies for Reliable Decentralised Storage. 36-44
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.