


default search action
Journal of Networks, Volume 5
Volume 5, Number 1, January 2010
- Jian Cao, Xin Wang:

Guest Editorial. 1-2 - Qingkui Chen, Haifeng Wang, Wei Wang:

Continuance Parallel Computation Grid Composed of Multi-Clusters. 3-10 - Sukhendu Kanrar, Nabendu Chaki

:
FAPP: A New Fairness Algorithm for Priority Process Mutual Exclusion in Distributed Systems. 11-18 - Ruonan Rao, Shuying Liang, Jinyuan You:

LBLS: A Locality Bounded Hashing-Based Location Service. 19-27 - Hanjiang Luo, Zhongwen Guo, Wei Dong, Feng Hong

, Yiyang Zhao:
LDB: Localization with Directional Beacons for Sparse 3D Underwater Acoustic Sensor Networks. 28-38 - Yanwei Chen, Demin Li, Chenwen Wang, Jiacun Wang:

Map Synchronization and Alternatives Optimization for Firefighters Cooperative Decision Support in Ad Hoc Networks. 39-46 - Zhi Chen, Wei Chen, Pingyi Fan

, Khaled Ben Letaief
:
Relay Aided Wireless Multicast Utilizing Network Coding: Outage Behaviour and Diversity Gain. 47-56 - Shuang Yang, Xin Wang:

An Incentive Mechanism for Tree-based Live Media Streaming Service. 57-64 - Brendan McAllister, Alan Marshall

, Roger F. Woods
:
A Programmable Architecture for Layered Multimedia Streams in IPv6 Networks. 65-74 - Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng:

Novel Stream Cipher Using SCAN and Variable Ordered Recursive CA Substitutions and Its DSP+FPGA Implementation. 75-87 - Fu Xiao, Shi Jin, Xie Li:

A Novel Data Mining-Based Method for Alert Reduction and Analysis. 88-97
- Zhitang Li, Jun Hu, Zhengbing Hu

, Bingbing Wang, Liang Tang, Xin Yi:
Measuring the botnet using the second character of bots. 98-105 - Wenbin Hu, Zhengbing Hu, Fu-qiang Yang, Cunlian Fan, Lei Wang, Xin-long Tan:

Control Strategy of Scheduling Invalidation of Data Broadcasting. 106-111 - Shaoping Zhang, Guohui Li, Wei Wei, Bing Yang:

A Novel Iterative Multilateral Localization Algorithm for Wireless Sensor Networks. 112-119 - Chang Liu, Xiaowei Qin, Sihai Zhang, Wuyang Zhou:

Analysis of Queuing Behaviors with Self-similar Traffic in Wireless Channels. 120-127
Volume 5, Number 2, February 2010
- Marian Marciniak

, Ioannis Tomkos
:
Guest Editorial. 129-131 - Ridha Rejeb, Mark S. Leeson

, Carmen Mas Machuca
, Ioannis Tomkos
:
Control and Management Issues in All-Optical Networks. 132-139 - Yosef Ben-Ezra, Moshe Ran, Boris I. Lembrikov, U. Mahlab, M. Haridim, Amir Leibovich:

Optical Transmission of OFDM Ultra-wideband Signals beyond 40 Gb/s (Invited Paper). 140-151 - Prince M. Anandarajah

, Aleksandra Kaszubowska-Anandarajah
, Robert Maher, Kai Shi
, Liam P. Barry
:
Characterization of Wavelength Tunable Lasers for Future Optical Communication Systems. 152-157 - Christina Hebebrand, Werner Rosenkranz:

Signal Processing Algorithms in 100Gb/s Optical Coherent and Non-coherent Receivers with PSK Modulation. 158-164 - Selma Batti, Mourad Zghal

, Noureddine Boudriga:
A New All-Optical Switching Node Including Virtual Memory and Synchronizer. 165-179 - Stephan Hellerbrand, Norbert Hanik:

Electronic Predistortion for Compensation of Fiber Transmission Impairments - Theory and Complexity Considerations. 180-187 - Leontios Stampoulidis, Efstratios Kehayas, Paraskevas Bakopoulos

, Dimitrios Apostolopoulos
, Panagiotis Zakynthinos, Dimitrios Petrantonakis, Hercules Avramopoulos
, Alistair Poustie, Graeme Maxwell:
Photonic Routing Systems Using All-optical, Hybrid Integrated Wavelength Converter Arrays. 188-196 - Jelena Grubor, Klaus-Dieter Langer:

Efficient Signal Processing in OFDM-based Indoor Optical Wireless Links. 197-211 - Armin Ehrhardt, Daniel Fritzsche, Manuel Paul, Lars Schürer, Dirk Breuer, Werner Weiershausen, Volker Fürst, Normand Cyr, Hongxin Chen, Gregory W. Schinn:

Characterisation of the PMD Distribution along Optical Fibres and Improvement of the Backbone Fibre Infrastructure by a POTDR. 212-218 - Robert Elschner, Christian-Alexander Bunge, Klaus Petermann:

System Impact of Cascaded All-Optical Wavelength Conversion of D(Q)PSK Signals in Transparent Optical Networks. 219-224 - Javier Aracil, José Alberto Hernández

, Antonio J. Elizondo, Raúl Duque, Óscar González de Dios:
On Local CAC Schemes for Scalability of High-speed Networks. 225-229 - Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani

:
Storage and Mirroring in Single and Dual Section Metro WDM Rings under Different Traffic Scenarios. 230-241 - Naoya Wada:

Optical Code Processing System, Device, and its Application. 242-250 - Helio Waldman, Darli A. A. Mello:

SLA-Aware Survivability. 251-255 - Oscar Pedrola, Miroslaw Klinkowski

, Davide Careglio
, Josep Solé-Pareta
, Sébastien Rumley, Christian Gaumier:
JAVOBS: A Flexible Simulator for OBS Network Architectures. 256-264
Volume 5, Number 3, March 2010
- Min Young Chung, Jae-Hyun Kim, Masato Oguchi, Jeng-Shyang Pan:

Guest Editorial. 265-266 - Shu-Chuan Chu

, Lakhmi C. Jain, Hsiang-Cheh Huang
, Jeng-Shyang Pan:
Error-Resilient Triple-Watermarking with Multiple Description Coding. 267-274 - Chin-Chen Chang, Shih-Chang Chang:

The Design of E-Traveler's Check with Efficiency and Mutual Authentication. 275-282 - Riaz Ahmed Shaikh

, Young-Koo Lee, Sungyoung Lee:
An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks. 283-291 - Sang Jin Lee, Hae Young Lee, Tae Ho Cho:

Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic. 292-299 - Gicheol Wang, Seunghae Kim

, Daewook Kang, Deokjai Choi, Gihwan Cho:
Lightweight Key Renewals for Clustered Sensor Networks. 300-312 - Kyung Hoon Won, Jung-Su Han, Hyung-Jin Choi:

Sampling Frequency Offset Estimation Methods for DVB-T/H Systems. 313-320 - Djelloul Boukhelef, Hiroyuki Kitagawa

:
Efficient Load Balancing Techniques for Self-organizing Content Addressable Networks. 321-334 - Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang

:
An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks. 335-342 - Kai Liu, Victor C. S. Lee

:
A Conflict Avoidance Data Allocation Algorithm in a Multi-channel Broadcast Environment. 343-350 - Shih Tsung Liang:

A Simple yet Effective Scheme for the Maintenance of Proxy Information in IEEE 802.11s Wireless Mesh Networks. 351-358
- Jianbin Xue, Zhanting Yuan:

An Adaptive Power Saving Strategies based on Cross-layer Design in IEEE 802.16e. 359-366 - Hong-yan Qian, Bing Chen, Xiaolin Qin:

A Novel Mobility Management Protocol Supporting Network Seamless Roaming. 367-374 - Rui Yang, Tiande Guo, Ge Chen

:
A Discussion of Maximizing System Performance in Wireless Sensor Networks. 375-382 - Min Xiang, Zhiyong Luo, Ping Wang:

Energy-Efficient Intra-Cluster Data Gathering of Wireless Sensor Networks. 383-390
Volume 5, Number 4, April 2010
- Robin G. Qiu

, Matthew He:
Guest Editorial. 391-392 - Hua Jiang, Junhu Ruan:

Investment Risks Assessment on High-tech Projects Based on Analytic Hierarchy Process and BP Neural Network. 393-402 - Xiaonan Wang, Huanyan Qian:

Design and Implementation of Anycast Services in Ad Hoc Networks Connected to IPv6 Networks. 403-410 - Jun Tang, Xiaojuan Zhao:

A Hybrid Particle Swarm Optimization with Adaptive Local Search. 411-418 - Xiaoying Shuai, Zhenchao Zhang:

Research of Real-Time Wireless Networks Control System MAC Protocol. 419-426 - Yongquan Zhou, Weiwei Zhang, Aijia Ouyang:

Population Migration Algorithm Description Method and Application Based on Unified Framework of Swarm Intelligence. 427-434 - Ya-qin Fan, Lin-zhu Wang, Li Zhou:

The Comparision and Simulation of Ad Hoc Network Routing Protocol Based on NS2. 435-442
- Weiwei Xiang, Peizhong Lu:

Bit-Based Joint Source-Channel Decoding of Huffman Encoded Markov Multiple Sources. 443-450 - Qihui Liang, Qingsong Wen

, Yue Xiao, Shaoqian Li:
Comparisons of SCR and Active-set Methods for PAPR Reduction in OFDM Systems. 451-458 - Chongqing Zhang:

Investigating the Optimum Carrier Sensing Range Using Transmission Relation Graph in Wireless Ad hoc Networks. 459-466 - Peng Shang, Guangxi Zhu, Gang Su, Kai Deng:

Low Complexity Antenna Selection Algorithms for downlink Distributed MIMO Systems. 467-474 - Shaohua Teng, Hongle Du, Naiqi Wu, Wei Zhang, Jiangyu Su:

A Cooperative Network Intrusion detection Based on Fuzzy SVMs. 475-483 - Zhijin Zhao, Junjie Pu:

New Detection Methods of DS-CDMA Signal at Lower SNR. 484-491 - Yong Yi, Haifang Jian, Zhi Fang, Yin Shi:

Carrier Frequency Offset and Phase Noise Recovery in Correlated MIMO-OFDM Systems. 492-499 - Chunguang Ma, Guining Geng, Huiqiang Wang:

A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks. 500-507
Volume 5, Number 5, May 2010
- Natarajan Meghanathan

:
Impact of the Gauss-Markov Mobility Model on Network Connectivity, Lifetime and Hop Count of Routes for Mobile Ad hoc Networks. 509-516 - Zhitang Li, Binbin Wang, Dong Li, Hao Chen, Feng Liu, ZhengBin Hu:

The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection. 517-526 - Yang Lu, Jiguo Li:

Forward-Secure Certificate-Based Encryption and its Generic Construction. 527-534 - Nike Gui, Jian-bin Hu, Zhong Chen:

A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. 535-542 - Feng Chen, Dehui Liu, Yi Zhang, Jinshu Su

:
A Scalable Approach to Analyzing Network Security using Compact Attack Graphs. 543-550 - Wei Gong, Zhiyang You, Danning Chen, Xibin Zhao, Ming Gu, Kwok-Yan Lam:

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks. 551-558 - Yun Ye, Liusheng Huang, Wei Yang, Youwen Zhu:

Efficient protocols for point-convex hull inclusion decision problems. 559-567 - Xiaocong Yu, Xiaomei Dong, Ge Yu, Yuhai Qin, Dejun Yue, Yan Zhao:

Online Botnet Detection Based on Incremental Discrete Fourier Transform. 568-576 - Feng Liu, Zhitang Li, Zhengbing Hu

, Lijuan Zhou, Bin Liu, Junfeng Yu:
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic. 577-585 - Gengsheng Zheng, Zhengbing Hu:

A Clustering Protocol Using Multiple Chain Strategy in WSNs. 586-593 - Yan Gao, Zhibin Zhang, Weifeng Du:

The Research of Load Balancing Technology in Server Colony. 594-602 - Yiqin Lu, Guangxue Yue, Jiajin Wang:

Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation. 603-613 - Shu Wang, Changjia Chen:

Modeling and Analysis of Source Management Routing Scheme for BGP. 614-621 - Zuowen Tan:

Analysis and Improvement of a User Authentication Improved Protocol. 622-630
Volume 5, Number 6, June 2010
- Fei Yu, Chin-Chen Chang, Wen Chen, Jun Zhang, Guangxue Yue:

Guest Editorial. 631-633 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen, Xuliang Li, Guowen Li:

Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. 634-641 - Rongwei Yu, Fan Yin, Jin Ke, Lina Wang:

Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains. 642-649 - Xin He, Hua Yang, Xiaolin Gui:

The Maximum Coverage Set Calculated Algorithm for WSN Area Coverage. 650-657 - Shuai Gao, Hongke Zhang:

Energy Efficient Path-constrained Sink Navigation in Delay-guaranteed Wireless Sensor Networks. 658-665 - Ye Yao, Wandong Cai:

Ad Hoc Network Measurement Based on Network Tomography: Theory, Technique, and Application. 666-674 - Mukun Cao:

Agent Communication Language for Automated Negotiation Online. 675-682 - Bo Meng, JiangQing Wang:

An Efficient Receiver Deniable Encryption Scheme and Its Applications. 683-690 - Zhenhua Wu, Jian Shu, Pengliu Tan:

Bit-coding Aggregation Tree for Global Network Link Quality Representation in WSN. 691-698
- Chuanliang Xia:

A Petri Net Synthesis Method. 699-707 - Yu Wang:

Study on Energy Conservation in MANET. 708-715 - Zhijian Wang, Dingguo Wei, Cheng Xu:

Model Transform Based on a Kind of Transition Subnet. 716-723 - Limin Peng, Zhanmao Cao:

Fairness resource allocation and scheduling for IEEE 802.16 Mesh networks. 724-731 - Wenjun Xiao, Weibing Wang:

On Symmetry for Network Virtual Topology. 732-739 - Junchao Li, Weimin Lei, Haiyang Si:

A Comparison of Multimedia Conferencing Frameworks. 740-747 - Rong-sheng Dong, Yuan-chuang Hu, Jian-ming Liu:

EC-PPRA: An Energy Efficient Routing Protocol for Ad Hoc Networks. 748-755
Volume 5, Number 7, 2010
- Mohammad M. Banat:

Guest Editorial. 757-758
- Giovanni Garbo

, Stefano Mangione:
An Improved Detection Technique for Cyclic-Prefixed OFDM. 759-765 - Hala M. Mahmoud, Allam Mousa

, Rashid Saleem
:
Channel Estimation Based in Comb-Type Pilots Arrangement for OFDM System over Time Varying Channel. 766-772 - Yasir Zaki

, Thushara Weerawardane, Andreas Timm-Giel
, Carmelita Görg, Gennaro C. Malafronte:
Performance Enhancement due to the TNL Congestion Control on the Simultaneous Deployment of both HSDPA and HSUPA. 773-781 - Cherif Ghazel

, Leïla Azouz Saïdane:
Dimensioning of NGN Main Components with Improved and Guaranteed Quality of Service. 782-791 - Jun Li, Yiqiang Q. Zhao:

Modeling and Analysis of Resequencing Delay in Selective Repeat Automatic Repeat Request. 792-799 - Hojatollah Hamidi, Abbas Vafaei, Seyed Amir Hassan Monadjemi:

Evaluation and Checkpointing of Fault Tolerant Mobile Agents Execution in Distributed Systems. 800-807 - Amer Mohammed Al-Canaan, Ahmed Khoumsi:

Cross-platform Approach to Advanced IP-Telephony Services using JAIN-SIP. 808-814 - Mohammad Momani, Subhash Challa, Rami Al-Hmouz

:
Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks. 815-822 - Maen Takruri

, Subhash Challa, Rajib Chakravorty:
Recursive Bayesian Approaches for Auto Calibration in Drift Aware Wireless Sensor Networks. 823-832
- Yue Lu:

A Novel Improved DSR Algorithm Based on Cross-Layer Mechanism in Wireless Mesh Network. 833-840 - Rongbo Zhu, Yingying Qin:

QoS-aware Rate Control Algorithm in Long Distance Wireless Mesh Networks. 841-848 - Wenli Dong:

The Research on Web Service based Network Management. 849-854 - Mengbo Hou, Qiuliang Xu, Shanqing Guo, Han Jiang:

Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings. 855-862 - Xufu Peng, Yi Ding, Xuan Huang:

The Design of Multi-Signature Certification Algorithm Protocol in Emergency Response System. 863-866 - Rui Li, Xiaofeng Ju:

Research on Technological Innovation Evolution Based on Self-organization Theory: the Case of China Communication Industry. 867-874
Volume 5, Number 8, 2010
- Hsing-Chung Chen, Franz I. S. Ko, Yung-Chen Chou, Shyan-Ming Yuan

, Yaw-Chung Chen, Chin-Chen Chang, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai
, Keh-Ming Lu:
Guest Editorial. 875-879
- Sheng-Hsuan Hsu, Ching-Chi Hsu, Shun-Shii Lin, Ferng-Ching Lin:

The Analysis of a Self-stabilizing MAC Protocol for Multi-channel Ad Hoc Networks. 880-887 - Hao-peng Chen, Can Zhang, Guang Yang:

A Model for Managing and Discovering Services Based on Dynamic Quality of Services. 888-895 - Hui-Kai Su, Wen-Hsu Hsiao:

A Cluster-Based Collaboration Framework for SIP Conference Applications. 896-903 - Otgonchimeg Buyanjargal, Youngmi Kwon:

Adaptive and Energy Efficient Clustering Algorithm for Event-Driven Application in Wireless Sensor Networks (AEEC). 904-911 - Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Yung-Fa Huang

, Chung-Wei Chen:
A Generalized Temporal and Spatial Role-Based Access Control Model. 912-920 - Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen:

An ECC-Based Blind Signature Scheme. 921-928 - Chen-Hua Shih, Yaw-Chung Chen:

A FMIPv6 Based Handover Scheme for Real-Time Applications in Mobile WiMAX. 929-936 - Kuan-Chieh Liao, Wei-Hsun Lee:

A Novel User Authentication Scheme Based on QR-Code. 937-941 - Jyu-Wei Wang, Hsing-Chung Chen, Yi-Ping Lin:

A Secure Destination-Sequenced Distance-Vector Routing Protocol for Ad Hoc Networks. 942-948 - Yung-Fa Huang

, Tung-Jung Chan, Tsair-Rong Chen, Young-Long Chen, Neng-Chung Wang
:
Performance of an Energy Efficient Routing Scheme for Cluster-based Wireless Sensor Networks. 949-955 - Shen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen:

Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks. 956-963 - Jong-Shin Chen, Zeng-Wei Hong

, Neng-Chung Wang
, San-Heui Jhuang:
Efficient Cluster Head Selection Methods for Wireless Sensor Networks. 964-970 - Rui-Yen Chang, Hsin-Ta Chiao, Chin-Lung Lee, Yu-Cheng Chen:

Applications for IP Video Surveillance over the ITRI MTWAL. 971-976 - Yung-Fa Huang

, Hsing-Chung Chen, Hung-Chi Chu, Jiun-Jian Liaw, Fu-Bin Gao:
Performance of Adaptive Hysteresis Vertical Handoff Scheme for Heterogeneous Mobile Communication Networks. 977-983 - Young-Hyun Choi, Tai-Myoung Chung:

Using Correspondent Information for Route Optimization Scheme on Proxy Mobile IPv6. 984-989
Volume 5, Number 9, 2010
- Dongfeng Yuan, Chin-Chen Chang, Fei Yu, Guozhu Liu, Jun Zhang:

Guest Editorial. 991-993
- Zhaoquan Cai, Wenjun Xiao, Qin Zhang, Yanxia Liu:

Principle of Symmetry for Network Topology with Applications to Some Networks. 994-1000 - Shukui Zhang, Jianxi Fan, Sheng-Rong Gong, Zhiming Cui:

An Efficient and Robust Data Dissemination Protocol in Wireless Sensor Networks. 1001-1008 - Yuhua Liu, Yongwei Meng, Kaihua Xu, Hongcai Chen:

Research Of A Small World Architecture And Frangibility For P2P Networks. 1009-1016 - Jingjun Zhu, Haiyan Wu, Guozhu Gao:

An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification. 1017-1024 - Xiang Qiu, Li Zhang, Shouxin Wang, Guanqun Qian:

A Trust Transitivity Model Based-on Dempster-Shafer Theory. 1025-1032 - GaoJun Fan, Shiyao Jin:

Coverage Problem in Wireless Sensor Network: A Survey. 1033-1040
- Bin Wang, Jinkuan Wang, Xin Song, Yinghua Han:

Research on Model and Algorithm of Waveform Selection in Cognitive Radar. 1041-1046 - Xiu-ying Sun, Xiang-xian Zhu, Li-lei Wang:

A Priority and SDB based Admission Control in IEEE 802.16 Systems. 1047-1052 - Zhuoyun Zhang, Chunping Hou, Zhigang Jin:

Depth Image-based Techniques for Compression, Transmission and Display of Auto-stereo Video. 1053-1059 - Jianmin Zhang, Jian Li:

Load-balanced Route Discovery for Wireless Sensor Networks. 1060-1067 - Bin Wang, Jianhui Zhang, Yunfei Guo, Wenping Chen:

Fast-Converging Distance Vector Routing Mechanism for IP Networks. 1068-1075 - Zhibin Liu, Shaomei Yang:

A Hybrid Intelligent Optimization Algorithm to Assess the NSS Based on FNN Trained by HPS. 1076-1083 - Xin Song, Jinkuan Wang, Bin Wang, Yinghua Han:

Robust Constrained CMA Based on a Bayesian Approach under Quadratic Constraint. 1084-1091 - Yue-sheng Gu, Meng-tao Ye, Yong Gan:

Web Services Security Based on XML Signature and XML Encryption. 1092-1097 - Zhifeng Chen, Qiaoming Zhu, Peide Qian, Fengyan Chen:

IPv6-Based Dynamic Quality of Service Control Strategy for Wireless Network. 1098-1105 - Feng-Yu Lei, Guohua Cui, Cai Fu, Peng Xu, Jing Chen:

Secure Authentication Scheme based on IBE. 1106-1113
Volume 5, Number 10, 2010
- Feng Gao, Bin Wang, Deyun Yang, Junhu Zhang, Shifei Ding:

Guest Editorial. 1115-1117
- Jun-Hu Zhang, Feng-Jing Shao:

BF-k: a Near-optimal Operator Placement Algorithm for In-network Query Processing. 1118-1126 - Dao-quan Li, Huai-cai Wang, Jun-Hu Zhang, Qi-guang Cao:

Fuzzy Clustering Algorithm Based on the Time and Surplus Energy Constrain for Ad Hoc Network. 1127-1134 - Zhengli Zhai, Wei Zhang:

The Estimation of Trustworthy of Grid Services Based on Neural Network. 1135-1142 - Xiaoyuan Bao, Yanzhong Jin:

XPath Query Completeness Verification Algorithms in DAS. 1143-1150 - Yu Xu, Dongbo Zhang, Yaonan Wang:

Active Diverse Learning Neural Network Ensemble Approach for Power Transformer Fault Diagnosis. 1151-1159 - Lingyun Yuan, Xingchao Wang, Jianhou Gan, Yanfang Zhao:

A Data Gathering Algorithm Based on Mobile Agent and Emergent Event-Driven in Cluster-Based WSN. 1160-1168 - Qin Wang, Yanqin Bai:

An Efficient Algorithm for Reverse 2-median Problem on A Cycle. 1169-1176 - Jinlong Wang, Ke Gao, Gang Li

:
Empirical Analysis of Customer Behaviors in Chinese E-Commerce. 1177-1184 - Songsen Yu, Yun Peng:

A Reflective NetGAP Design and its Session Mechanism Realization based on Agent. 1185-1191 - Yongli Wang, Dongxiao Niu, Xiaoyong Ma:

Optimizing of SVM with Hybrid PSO and Genetic Algorithm in Power Load Forecasting. 1192-1200
- Mohamed K. Watfa

, Mohamed Moubarak, Ali Kashani:
Operating System Design in Future Wireless Sensor Networks. 1201-1214 - Athanasios Tsokanos, Charalampos V. Mouchos, Elias G. Giacoumidis, Jianming Tang:

A Scalable Model for the Performance Evaluation of ROADMs with Generic Switching Capabilities. 1215-1220 - Tobias Baumgartner, Sándor P. Fekete, Winfried Hellmann, Alexander Kröller:

Simultaneous Event Execution in Heterogeneous Wireless Sensor Networks. 1221-1226 - Chang Liu

, Hong Jiang, De-Fa Wang, Yun-bai Qin:
MP-based Algorithm in Node Localization of Wireless Sensor Network. 1227-1234 - Zeeshan Ali Khan, Cécile Belleudy, Michel Auguin:

Energy Efficient Data Reporting Techniques for Grid Based Wireless Sensor Networks. 1235-1243
Volume 5, Number 11, 2010
- António Luis Jesus Teixeira

, Anna Tzanakaki
, Davide Careglio
, Miroslaw Klinkowski
:
Guest Editorial. 1245-1247
- Michela Svaluto Moreolo, Valentina Sacchieri, Gabriella Cincotti

, Gabriel Junyent
:
Trigonometric Transforms for High-Speed Optical Networks: All-Optical Architectures and Optical OFDM. 1248-1253 - Makoto Murakami:

Analyzing Power Consumption in Optical Cross-connect Equipment for Future Large-Capacity Optical Networks. 1254-1259 - Diane Prisca Onguetou, Wayne D. Grover:

A Simple Generalized Approach to Node Failure Recovery with Span-Protecting p-Cycles. 1260-1270 - Konstantinos Christodoulopoulos

, Panagiotis C. Kokkinos, Konstantinos Manousakis
, Emmanouel A. Varvarigos
:
Impairment Aware RWA in Optical Networks: Over-provisioning or Cross Optimization? 1271-1278 - Amornrat Jirattigalachote, Paolo Monti

, Lena Wosinska
, Kostas Katrinis, Anna Tzanakaki
:
ICBR-Diff: an Impairment Constraint Based Routing Strategy with Quality of Signal Differentiation. 1279-1289 - Sébastien Rumley, Christian Gaumier, Oscar Pedrola, Josep Solé-Pareta:

Feedback Based Load Balancing, Deflection Routing and Admission Control in OBS Networks. 1290-1299 - Chinwe E. Abosi, Reza Nejabati, Dimitra Simeonidou:

Design and Development of a Semantic Information Modelling Framework for a Service Oriented Optical Internet. 1300-1309 - Giorgio Maria Tosi-Beleffi, Gabriele Incerti, L. Porcari, Silvia Di Bartolo, Michele Guglielmucci, António L. J. Teixeira

, Liliana Costa, Naoya Wada, Josep Prat
, José A. Lázaro
, Philippe Chanclou
:
Reducing Complexity and Consumption in Future Networks. 1310-1314 - Armin Ehrhardt, Manuel Paul, Lars Schürer, Christoph Gerlach, Wolfgang Krönert, Daniel Fritzsche, Dirk Breuer, Volker Fürst, Normand Cyr, Hongxin Chen, Gregory W. Schinn:

Decrease of the Link PMD by Fiber Exchange and Investigation of the PMD Distribution along Buried Optical Fibers with a POTDR. 1315-1320 - Fernando Agraz, Luis Velasco, Jordi Perelló

, Marc Ruiz, Salvatore Spadaro
, Gabriel Junyent
, Jaume Comellas
:
Deployment and Validation of GMPLS-Controlled Multi-layer Integrated Routing over the ASON/GMPLS CARISMA Test-bed. 1321-1327 - Ivan Glesk

, Marc Sorel
, Anthony E. Kelly, Paul R. Prucnal:
Enhancing Performance of Optical Communication Systems with Advanced Optical Signal Processing. 1328-1334 - Annalisa Morea, Florence Leplingard, Jean-Christophe Antona, Pascal Henri, Thierry Zami, Daniel C. Kilper

:
Advanced Test-beds to Validate Physical Estimators in Heterogeneous Long Haul Transparent Optical Networks. 1335-1342 - Nicola Calabretta, Hyun-Do Jung, Harm J. S. Dorren:

All-optical Label Swapping Techniques for Optical Packets at Bit-rate Beyond 160 Gb/s. 1343-1349 - Efstratios Kehayas, Leontios Stampoulidis, Paraskevas Bakopoulos

:
Tb/s Transmission and Routing Systems Using Integrated Micro-Photonic Components. 1350-1356
- Chunzhi Wang, Hongwei Chen, Ke Zhou, Hui Xu, Zhiwei Ye

:
A Peer-to-Peer Game Model using Punishment Strategies. 1357-1364 - Wei Song, Wenbin Hu, Zhengbing Hu

, Xi Zeng:
Reliable Resource Search in Scale Free Peer-to-Peer Network. 1365-1372 - Gengsheng Zheng, Zhengbing Hu

:
Tree Routing Protocol with Location-based Uniformly Clustering Strategy in WSNs. 1373-1380 - Hongwei Chen, Xin Zhou, Fangping You, Hui Xu, Chunzhi Wang, Zhiwei Ye

:
A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode. 1381-1388
Volume 5, Number 12, 2010
- Feng Xie:

Design and Implementation of Highway Management System Based WebGIS. 1389-1392 - Pan Duan, Kaigui Xie

, Na Song, Qi-chang Duan:
A Method of Vehicle License Plate De-noising and Location in Low Light Level. 1393-1400 - Changpeng Ji, Xu Li, Mo Gao, Mei-zi Shi:

Study of Rate Assignment on the Downlink of WCDMA. 1401-1409 - Yongfeng Yin

, Bin Liu, Zhen Li, Chun Zhang, Ning Wu:
The Integrated Application Based on Real-time Extended UML and Improved Formal Method in Real-time Embedded Software Testing. 1410-1416 - Xinghua Fan, Hongge Hu:

Utilizing High-quality Feature Extension Mode to Classify Chinese Short-text. 1417-1425 - Xuping Wang, Xu Wu, Xiangpei Hu:

A Study of Urgency Vehicle Routing Disruption Management Problem. 1426-1433 - Qi Xie, Deren Chen:

Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card. 1434-1441 - Na Li, Yuanan Liu, Fan Wu, Bihua Tang:

WSN Data Distortion Analysis and Correlation Model Based on Spatial Locations. 1442-1449 - Xueying Zhang, Hairong Jia, Hong Xu:

A Modified Speech Blind Separation Method Based on Information Maximum. 1450-1457 - Chunming Li:

Blindman-Walking Optimization Method. 1458-1466 - Longxin Zhen, Xiaogang Wei:

Structure and Performance Analysis of Regenerative Electromagnetic Shock Absorber. 1467-1474 - Jianyu Bai, Senlin Tong, Zaihe Yu, Di Zheng:

Analysis and Simulations of Inertia Force in Ultra High Speed Stamping Machine. 1475-1480 - Ya-qin Fan, Kai-bo Zhang, Chao Sun:

The Research of TRIP Protocol Based on Soft-switching Technology. 1481-1489 - Shoucheng Ding, Wenhui Li, Shizhou Yang, Jianhai Li, Guici Yuan:

The Motor Virtual Experimental System Based on Matlab Web Technology. 1490-1495 - Dachuan Wei:

An Optimized Floyd Algorithm for the Shortest Path Problem. 1496-1504 - Yangang Xue, Han Wang, Xingqi Luo, Qiang He:

Monitor System Design for Machine Electric Spindle based on MCGS. 1505-1512 - Yanping Luo, Lixin Gao, Fang Wang:

The L2-LInfinite Control for Leader-following Coordination with Switching Topology and Time-delay. 1513-1520 - Zhiyong Zhang, Bailin Yang, Xun Wang:

A Log-Based 3D Model Retrieval Relevance Feedback Scheme Using Biased SVMs. 1521-1526 - Xue-yong Li, Guohong Gao, Jia-xia Sun:

A New Semi-unsupervised Intrusion Detection Method Based on Improved DBSCAN. 1527-1534

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














