default search action
International Journal of Communication Networks and Distributed Systems, Volume 11
Volume 11, Number 1, 2013
- Florian Zeiger, Zachos Boufidis:
Towards Future Internet services through crowdsourcing-based sensor platforms. 4-10 - Maja Vukovic, Rajarshi Das, Soundar R. T. Kumara:
From sensing to controlling: the state of the art in ubiquitous crowdsourcing. 11-25 - Meiyappan Yuvarani, N. Ch. S. N. Iyengar, Arputharaj Kannan:
Improved concept-based query expansion using Wikipedia. 26-41 - Daniel Schall:
Formation and interaction patterns in social crowdsourcing environments. 42-58 - Shaozhi Ye, Shyhtsun Felix Wu:
Measuring message propagation and social influence on Twitter.com. 59-76 - Charlott Lorentzen, Markus Fiedler, Henric Johnson:
On user perception of safety in online social networks. 77-91 - Sajal Sarkar, Raja Datta:
AODV-based technique for quick and secure local recovery from link failures in MANETs. 92-116
Volume 11, Number 2, 2013
- Abdelouahid Derhab, Djamel Djenouri, Jianguo Ding:
Editorial. 117-119 - A. S. Poornima, B. B. Amberker:
Key establishment protocols for secure communication in clustered sensor networks. 120-138 - Celimuge Wu, Satoshi Ohzahata, Toshihiko Kato:
A reliable and flexible data gathering protocol for battery limited wireless sensor networks. 139-156 - A. W. Rohankar, Mrinal Kanti Naskar, Amitava Mukherjee:
SWiFiNet: a real field WSN testbed. 157-171 - Mohamed Aissani, Sofiane Bouznad, S. E. Allia, A. Hariza:
Repellent voids for improving geographical routing efficiency in wireless sensor networks. 172-197 - Manish Kumar, Shekhar Verma, Neerav Agarwal:
GMCA: a greedy multilevel clustering algorithm for data gathering in wireless sensor networks. 198-213 - Jia Hao Kong, Li-Minn Ang, Kah Phooi Seng:
Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks. 214-232
Volume 11, Number 3, 2013
- Ghalem Belalem, Said Limam:
An approach to fault tolerance in the cloud using the checkpointing technique. 236-249 - Rabih Bashroush, Moustafa Noureddine:
A cost effective cloud data centre capacity planning method based on modality cost analysis. 250-261 - N. Jeyanthi, Uttara Barde, M. Sravani, Venu Tiwari, N. Ch. Sriman Narayana Iyengar:
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP. 262-279 - Timothy O'Sullivan, Bob Wood:
Dynamic negotiation of cloud computing services in market-oriented environments. 280-296 - Nakul Gupta, Sushant Goyal:
Effective use of cloud computing in education: education as a service. 297-309 - Mohsen Sharifi, Hadi Salimi, Alireza Saberi, Joobin Gharibshah:
VMM detection using privilege rings and benchmark execution times. 310-326 - G. M. Siddesh, K. G. Srinivasa:
SLA-driven dynamic capacity forecasting and resource allocation with risk analysis on clouds. 327-346
Volume 11, Number 4, 2013
- Ankur Gupta, Lalit Kumar Awasthi:
Peer enterprises: design and implementation of a cross-organisational peer-to-peer framework. 347-375 - Rabindranath Ghosh, Koushik Sinha, Debasish Datta, Bhabani P. Sinha:
Energy-efficient communication in multihop wireless sensor networks using ternary encoding and silent symbols. 376-389 - L. D. Dhinesh Babu, Parimala Venkata Krishna:
Versatile time-cost algorithm (VTCA) for scheduling non-preemptive tasks of time critical workflows in cloud computing systems. 390-411 - Lotfi Ben Othmane, Harold Weffers, Pelin Angin, Bharat K. Bhargava:
A time-evolution model for the privacy degree of information disseminated in online social networks. 412-430 - Nadira Benlahrache, Faiza Belala:
Towards formalising installation and reconfiguration tasks of AADL architecture. 431-452 - Mohammad Abdur Razzaque, Simon Dobson, Kieran Delaney:
Augmented materials: spatially embodied sensor networks. 453-477
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.