You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Author Index Volume 21 (2015)

Babes, M., see Khelifi, M. (4) 313–330

Bagwari, A., J. Kanti, G.S. Tomar and A. Samarah, Reliable spectrum sensing scheme based on dual detector with double-threshold for IEEE 802.22 WRAN (3) 205–220

Barolli, L., see Elmazi, D. (1) 15– 25

Barolli, L., see Liu, Y. (1) 27– 42

Barolli, L., see Matsuo, K. (1) 1– 14

Boudjit, S., see Khelifi, M. (4) 313–330

Bukatov, A.A., see Sultanov, T.G. (3) 155–164

Byun, H., A reliable data delivery scheme with delay constraints for wireless sensor networks (3) 195–203

Chen, X., S. Ouyang and Y. Ding, Energy-aware resource allocation for cooperative cognitive radio dynamic spectrum access networks (2) 131–139

Ding, Y., see Chen, X. (2) 131–139

Ding, Y., see Wang, K. (2) 141–153

Dong, C., see Lu, D. (3) 221–235

Dong, S., see Lu, D. (3) 221–235

El-Zoghdy, S.F. and A.I. Elnashar, A threshold-based load balancing algorithm for grid computing systems (4) 237–257

Elmazi, D., E. Kulla, K. Matsuo, T. Oda, E. Spaho and L. Barolli, A mobility-aware fuzzy-based system for actor selection in wireless sensor–actor networks (1) 15– 25

Elmazi, D., see Matsuo, K. (1) 1– 14

Elnashar, A.I., see El-Zoghdy, S.F. (4) 237–257

Ghanemi, S., see Khelifi, M. (4) 313–330

Gui-Cheng, W. and Y. Jie, A data extraction and layout generation framework for web service (2) 83– 94

Guomin, Z., see Xiulei, W. (4) 285–298

Hänninen, T., see Mikhaylov, K. (3) 165–180

Hou, L., see Wang, K. (2) 141–153

Ikeda, M., see Liu, Y. (1) 27– 42

Jamhour, E., see Mariani, W.C. (1) 57– 68

Jia, C., see Zhao, C. (2) 95–106

Jie, Y., see Gui-Cheng, W. (2) 83– 94

Kanti, J., see Bagwari, A. (3) 205–220

Khelifi, M., M. Babes, S. Ghanemi, M.Y. Saidi and S. Boudjit, Hybrid heuristic for Capacitated Network Design Problem (4) 313–330

Kulla, E., Evaluating the effect of static components in MANET by simulations (4) 273–284

Kulla, E., see Elmazi, D. (1) 15– 25

Li, J., F. Xhafa and J. Weng, Editorial: Emerging services and technologies in wireless networks (2) 81– 82

Li, T., see Wang, K. (2) 141–153

Li, T., see Wang, Y. (3) 181–194

Liu, Q., see Wang, Y. (3) 181–194

Liu, Y., S. Sakamoto, K. Matsuo, M. Ikeda, L. Barolli and F. Xhafa, Improving reliability of JXTA-Overlay P2P platform: A comparison study for two fuzzy-based systems (1) 27– 42

Liu, Y., see Matsuo, K. (1) 1– 14

Liu, Z., see Wang, R. (2) 107–120

Liu, Z., see Wang, Y. (3) 181–194

Lu, D., S. Dong, M. Tao, C. Dong and B. Qiu, A velocity and neighbor density-based broadcast scheme in mobile ad hoc networks (3) 221–235

Mariani, W.C., M.C. Penna, M.E. Pellenz and E. Jamhour, Channel allocation algorithms for co-existence of base stations in IEEE 802.22 networks (1) 57– 68

Matsuda, R., see Shigeyasu, T. (1) 43– 55

Matsuo, K., D. Elmazi, Y. Liu, S. Sakamoto, G. Mino and L. Barolli, FACS-MP: A fuzzy admission control system with many priorities for wireless cellular networks and its performance evaluation (1) 1– 14

Matsuo, K., see Elmazi, D. (1) 15– 25

Matsuo, K., see Liu, Y. (1) 27– 42

Mikhaylov, K. and T. Hänninen, Mechanisms for improving throughput and energy efficiency of Bluetooth Low Energy for multi node environment (3) 165–180

Ming, C., see Xiulei, W. (4) 285–298

Mino, G., see Matsuo, K. (1) 1– 14

Narimani Zaman Abadi, M. and A. Nowroozi, A real-time GPU-based approach for alert aggregation (1) 69– 80

Nowroozi, A., see Narimani Zaman Abadi, M. (1) 69– 80

Oda, T., see Elmazi, D. (1) 15– 25

Ouyang, S., see Chen, X. (2) 131–139

Pellenz, M.E., see Mariani, W.C. (1) 57– 68

Peng, X., see Yang, Y. (4) 299–311

Penna, M.C., see Mariani, W.C. (1) 57– 68

Qiu, B., see Lu, D. (3) 221–235

Saidi, M.Y., see Khelifi, M. (4) 313–330

Sakamoto, S., see Liu, Y. (1) 27– 42

Sakamoto, S., see Matsuo, K. (1) 1– 14

Samarah, A., see Bagwari, A. (3) 205–220

Shigeyasu, T. and R. Matsuda, CA-BMAC: A collision avoidance multi-channel broadcast MAC protocol with a mechanism for reducing transmission overhead (1) 43– 55

Spaho, E., see Elmazi, D. (1) 15– 25

Sukhov, A.M., see Sultanov, T.G. (3) 155–164

Sultanov, T.G., A.M. Sukhov and A.A. Bukatov, Differentiation criterion for classes of network service (3) 155–164

Sun, F., see Wang, K. (2) 141–153

Sun, J., see Wang, Y. (3) 181–194

Tao, M., see Lu, D. (3) 221–235

Tao, M., see Wang, R. (2) 107–120

Tomar, G.S., see Bagwari, A. (3) 205–220

Wan, X., see Yang, Y. (4) 299–311

Wang, K., H. Zhao, Y. Ding, T. Li, L. Hou and F. Sun, Optimization of air pollutant monitoring stations with constraints using genetic algorithm (2) 141–153

Wang, R., Z. Liu, M. Tao and L. Zhang, Identifying Internet background radiation traffic based on traffic source distribution (2) 107–120

Wang, Y., T. Li, Q. Liu, J. Sun and Z. Liu, The impact of social cloud reputation and structure on rational computation (3) 181–194

Weng, J., see Li, J. (2) 81– 82

Xhafa, F., see Li, J. (2) 81– 82

Xhafa, F., see Liu, Y. (1) 27– 42

Xia, C., see Zhao, C. (2) 95–106

Xianglin, W., see Xiulei, W. (4) 285–298

Xiulei, W., C. Ming, W. Xianglin and Z. Guomin, Defending DDoS attacks in software defined networking based on improved Shiryaev–Roberts detection algorithm (4) 285–298

Yang, C. and J. Ye, Secure and efficient fine-grained data access control scheme in cloud computing (4) 259–271

Yang, T., see Zhang, J. (2) 121–129

Yang, Y., X. Peng and X. Wan, Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing (4) 299–311

Ye, J., see Yang, C. (4) 259–271

Zhang, J., T. Yang and C. Zhao, Load balancing and data aggregation tree routing algorithm in wireless sensor networks (2) 121–129

Zhang, L., see Wang, R. (2) 107–120

Zhao, C., C. Xia and C. Jia, Research and analysis on spatial adaptive strategy of End-hopping system (2) 95–106

Zhao, C., see Zhang, J. (2) 121–129

Zhao, H., see Wang, K. (2) 141–153