


default search action
Journal of Network and Computer Applications, Volume 30
Volume 30, Number 1, January 2007
- Ajith Abraham, Kate A. Smith

, Ravi Jain, Lakhmi C. Jain:
Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications. 1-3 - Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan

:
VQ-based watermarking scheme with genetic codebook partition. 4-23 - Tai-Wen Yue, Suchen Chiang:

The semipublic encryption for visual cryptography using Q'tron neural networks. 24-41 - Gail-Joon Ahn

, Badrinath Mohan, Seng-Phil Hong:
Towards secure information sharing using role-based delegation. 42-59 - Yihua Liao, V. Rao Vemuri, Alejandro Pasos:

Adaptive anomaly detection with evolving connectionist systems. 60-80 - Ajith Abraham, Ravi Jain, Johnson P. Thomas, Sang-Yong Han:

D-SCIDS: Distributed soft computing intrusion detection system. 81-98 - Tansel Özyer, Reda Alhajj, Ken Barker:

Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. 99-113 - Sandhya Peddabachigari, Ajith Abraham, Crina Grosan

, Johnson P. Thomas:
Modeling intrusion detection system using hybrid intelligent systems. 114-132
- Ali El Kateeb:

High-speed routers design using data stream distributor unit. 133-144 - Hongsong Chen, Zhenzhou Ji, Mingzeng Hu, Zhongchuan Fu, Ruixiang Jiang:

Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. 145-166 - Khong Neng Choong, Borhanuddin Mohd Ali, Veeraraghavan Prakash

, Yoke Chek Yee:
The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme. 167-185 - Hojjat Jafarpour, Nasser Yazdani, Navid Bazzazzadeh:

A scalable group communication mechanism for mobile agents. 186-208 - Vana Kalogeraki

, Demetrios Zeinalipour-Yazti
, Dimitrios Gunopulos
, Alex Delis:
Distributed middleware architectures for scalable media services. 209-243 - Tainchi Lu, Chinghao Hsu:

Mobile agents for information retrieval in hybrid simulation environment. 244-264 - Hui Guo, Guobin Shen, Zhiguang Wang, Shipeng Li

:
Optimized streaming media proxy and its applications. 265-281 - Lei Guo, Hongfang Yu, Lemin Li:

Dynamic survivable algorithm for meshed WDM optical networks. 282-295 - Jenq-Shiou Leu, Yuan-Po Chi, Wei-Kuan Shih:

Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS). 296-307 - Lijun Qian, Ning Song, Xiangfang Li:

Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. 308-330 - Kwang-Sik Shin

, Jin-Ha Jung, Jin Young Cheon, Sang-Bang Choi:
Real-time network monitoring scheme based on SNMP for dynamic information. 331-353 - Xiaobo Zhou, Jianbin Wei, Cheng-Zhong Xu

:
Quality-of-service differentiation on the Internet: A taxonomy. 354-383 - Suneuy Kim

, Chita R. Das:
An analytical model for interval caching in interactive video servers. 384-413 - Mohammad Saniee Abadeh

, Jafar Habibi, Caro Lucas:
Intrusion detection using a fuzzy genetics-based learning algorithm. 414-428
Volume 30, Number 2, April 2007
- Rongxi He

, Bin Lin, Lemin Li:
Dynamic service-level-agreement aware shared-path protection in WDM mesh networks. 429-444 - Bruce Stephen, Lykourgos Petropoulakis:

The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement. 445-465 - Liang Wang, Yiping Guo, Ming Fang:

Web search engine based on DNS. 466-478 - Manuel Esteve

, Carlos Enrique Palau
, J. Martínez-Nohales, Benjamín Molina:
A video streaming application for urban traffic management. 479-498 - M. Can Filibeli, Öznur Özkasap

, M. Reha Civanlar
:
Embedded web server-based home appliance networks. 499-514 - Xiaobo Zhou, Cheng-Zhong Xu

:
Efficient algorithms of video replication and placement on a cluster of streaming servers. 515-540 - Kenneth J. Turner:

Representing and analysing composed web services using Cress. 541-562 - Christos Bouras, Giorgos Kounenis, Ioannis Misedakis:

A web content manipulation technique based on page Fragmentation. 563-585 - Siti Z. Z. Abidin, Min Chen, Phil W. Grant:

Designing interaction protocols using noughts and crosses type games. 586-613 - Alejandro Quintero, Da Yu Li, Harold Castro

:
A location routing protocol based on smart antennas for ad hoc networks. 614-636 - Yan Bai, Mabo Robert Ito:

A new technique for minimizing network loss from users' perspective. 637-649 - Lei Guo

, Jin Cao, Hongfang Yu, Lemin Li:
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks. 650-661 - Chin-Chen Chang, Chih-Yang Lin

, Keng-Chu Lin:
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. 662-676 - Jin Cao, Lei Guo

, Hongfang Yu, Lemin Li:
A novel recursive shared segment protection algorithm in survivable WDM networks. 677-694 - Rongping Lin, Sheng Wang, Lemin Li:

Protections for multicast session in WDM optical networks under reliability constraints. 695-705 - Chan-Ho Min, Sehun Kim:

On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks. 706-727 - Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih

, Shih-Chieh Lee:
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system. 728-749 - Kwang-Sik Shin

, Jin-Ha Jung, Wan-Oh Yoon, Sang-Bang Choi:
P2P transfer of partial stream in multimedia multicast. 750-774 - Yiqun Xu, Luigi Logrippo, Jacques Sincennes:

Detecting feature interactions in CPL. 775-799 - Ibrahim Özçelik

, Hüseyin Ekiz:
Building an interconnection between PROFIBUS and ATM networks. 800-817
Volume 30, Number 3, August 2007
- Xiaobo Zhou, Cheng-Zhong Xu

:
Distributed denial-of-service and intrusion detection. 819-822 - Shigang Chen, Yong Tang, Wenliang Du:

Stateful DDoS attacks and targeted filtering. 823-840 - Matthias Bossardt, Thomas Dübendorfer, Bernhard Plattner:

Enhanced Internet security by a distributed traffic control service based on traffic ownership. 841-857 - Vasilios A. Siris

, Ilias Stavrakis:
Provider-based deterministic packet marking against distributed DoS attacks. 858-876 - Tao Peng, Christopher Leckie

, Kotagiri Ramamohanarao
:
Information sharing for distributed intrusion detection systems. 877-899 - Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta

, Jesús D. Jiménez Re, Rafael Marín López:
A network access control approach based on the AAA architecture and authorization attributes. 900-919 - Celia Li, Cungang Yang, Richard Cheung:

Key management for role hierarchy in distributed systems. 920-936 - Bing Wu, Jie Wu, Eduardo B. Fernández

, Mohammad Ilyas
, Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks. 937-954
- George D. Magoulas

, George Ghinea:
Intelligence-based adaptation for ubiquitous multimedia communications. 955-957 - Dietmar Jannach, Klaus Leopold:

Knowledge-based multimedia adaptation for ubiquitous multimedia consumption. 958-982 - Nicola Cranley, Philip Perry, Liam Murphy

:
Dynamic content-based adaptation of streamed multimedia. 983-1006 - Michael J. O'Grady

, Gregory M. P. O'Hare
, C. Donaghey:
Delivering adaptivity through context-awareness. 1007-1033 - Vincent Charvillat, Romulus Grigoras:

Reinforcement learning for dynamic multimedia adaptation. 1034-1058 - Johan Bollen, Michael L. Nelson

, Gary Geisler
, Raquel Araujo:
Usage derived recommendations for a video digital library. 1059-1083
- Gloria E. Phillips-Wren, Anders I. Mørch, Jeffrey Tweedale, Nikhil Ichalkaranje:

Innovations in agent collaboration, cooperation and Teaming, Part 2. 1085-1088 - Jeffrey Tweedale, Nikhil Ichalkaranje, Christos Sioutis, B. Jarvis, Angela Consoli, Gloria E. Phillips-Wren:

Innovations in multi-agent systems. 1089-1115 - Lin Padgham

, Wei Liu
:
Internet collaboration and service composition as a loose form of teamwork. 1116-1135 - Antonella Di Stefano, Giuseppe Pappalardo

, Corrado Santoro
, Emiliano Tramontana:
A framework for the design and automated implementation of communication aspects in multi-agent systems. 1136-1152 - Wei Xu, Jiannong Cao

, Beihong Jin, Jing Li, Liang Zhang:
GCS-MA: A group communication system for mobile agents. 1153-1172 - Tom Wanyama, Behrouz Homayoun Far:

A protocol for multi-agent negotiation in a group-choice decision making process. 1173-1195 - Gerhard Weiß, Matthias Nickles

, Michael Rovatsos, Felix A. Fischer:
Specifying the intertwining of cooperation and autonomy in agent-based systems. 1196-1215 - Justin Zhijun Zhan, Stan Matwin

, LiWu Chang:
Privacy-preserving collaborative association rule mining. 1216-1227 - Abdelhamid Ouardani, Samuel Pierre, Hanifa Boucheneb:

A security protocol for mobile agents based upon the cooperation of sedentary agents. 1228-1243 - Ruth Aguilar-Ponce

, Ashok Kumar, J. Luis Tecpanecatl-Xihuitl
, Magdy A. Bayoumi:
A network of sensor-based framework for automated visual surveillance. 1244-1271
Volume 30, Number 4, November 2007
- Xiangjian He

:
Editorial. 1273-1274 - Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:

Capability-based egress network access control by using DNS server. 1275-1282 - Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian:

Extending metadata with scenarios in adaptive distributed system. 1283-1294 - Michael J. Callaghan, Jim Harkin

, E. McColgan, T. Martin McGinnity
, Liam P. Maguire
:
Client-server architecture for collaborative remote experimentation. 1295-1308 - Carolyn McGregor

, Bruce Kneale, Mark B. Tracy
:
On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband. 1309-1323 - Wenjing Jia

, Huaifeng Zhang, Xiangjian He
:
Region-based license plate detection. 1324-1333 - Hatice Gunes, Massimo Piccardi

:
Bi-modal emotion recognition from expressive face and body gestures. 1334-1345 - Junjun Xia, Lin Ni, Yuan Miao:

A new digital implementation of ridgelet transform for images of dyadic length. 1346-1355 - Donn Morrison, Liyanage C. De Silva

:
Voting ensembles for spoken affect classification. 1356-1365 - Ben-Nian Wang, Yang Gao, Zhaoqian Chen, Jun-Yuan Xie, Shifu Chen:

A two-layered multi-agent reinforcement learning model and algorithm. 1366-1376
- Jung-San Lee, Chin-Chen Chang:

Secure communications for cluster-based ad hoc networks using node identities. 1377-1396 - Christopher J. Martinez, Wei-Ming Lin, Parimal Patel:

Optimal XOR hashing for non-uniformly distributed address lookup in computer networks. 1397-1427 - Bart Duysburgh, Thijs Lambrecht, Filip De Turck, Bart Dhoedt, Piet Demeester:

Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks. 1428-1444 - Sahar A. Al-Talib, Borhanuddin Mohd Ali, Sabira Khatun, Subramaniam Shamala:

Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast. 1445-1454

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














