You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Author Index Volume 22 (2016)

Ahmadi, M. and E. Zadkhosh, A customized and reconfigurable VLIW-based packet classifier on ρ-VEX (3) 177–192

Al-Haj Baddar, S., A. Merlo and M. Migliardi, Generating statistical insights into network behavior using SKETURE (1) 65– 76

Alimi, V., see Guerar, M. (3) 231–240

Alyatama, A., Dynamic spectrum allocation for orthogonal frequency-division multiplexing optical networks with survivability and multicasting (1) 1– 13

Astrakhantseva, M.A., see Sukhov, A.M. (4) 321–333

Benmohammed, M., see Guerar, M. (3) 231–240

Boldyrev, S.S., see Sukhov, A.M. (4) 321–333

Bukatov, A.A., see Sukhov, A.M. (4) 321–333

Byun, H., A reaction-diffusion mechanisms for node scheduling design of wireless sensor networking systems (4) 309–319

Cai, F. and H. Yu, Index data distribution strategy in a distributed network (1) 43– 53

Chaporkar, P., see Krishnan, S. (2) 125–151

Chen, Y., see Mao, J. (1) 15– 34

Chen, Y., see Mao, J. (1) 55– 64

Choi, D., see Kim, T. (4) 293–307

Das, K., see Pradhan, A.K. (2) 95–111

Daxiang, H., see Ziyi, Y. (2) 169–176

De, T., see Pradhan, A.K. (2) 95–111

Deng, D., see Liu, F. (3) 193–204

Feng, J., see Ren, Z. (4) 281–291

Gao, Z.-M., see Yang, W.-D. (3) 223–230

Ghosh, A., see Pradhan, A.K. (2) 95–111

Gilani, S.M.M., see Xu, C. (4) 253–264

Guerar, M., M. Benmohammed and V. Alimi, Color wheel pin: Usable and resilient ATM authentication (3) 231–240

He, D., see Wang, H. (2) 153–167

Hu, C., see Wang, Q. (2) 113–124

Jia, Y., see Mao, J. (1) 15– 34

Jia, Y., see Mao, J. (1) 55– 64

Jun, S., see Ziyi, Y. (2) 169–176

Kaddour, M., see Tandjaoui, A.F. (3) 205–221

Kim, T., S. Lee, D. Choi and H. Yoon, Protecting secret keys in networked devices with table encoding against power analysis attacks (4) 293–307

Kong, D., see Tao, X. (1) 35– 42

Krishnan, S. and P. Chaporkar, On-line algorithm for optimizing throughput performance of wireless LANs (2) 125–151

Lee, S., see Kim, T. (4) 293–307

Li, Y., see Wang, Q. (2) 113–124

Liang, Z., see Mao, J. (1) 55– 64

Liu, F. and D. Deng, QoS-aware service composition with user preferences and multiple constraints (3) 193–204

Liu, H.-Y., see Yang, W.-D. (3) 223–230

Liu, Y., see Xu, C. (4) 253–264

Ma, H., see Mao, J. (1) 55– 64

Mao, J., H. Ma, Y. Chen, Y. Jia and Z. Liang, Automatic permission inference for hybrid mobile apps (1) 55– 64

Mao, J., R. Wang, Y. Chen and Y. Jia, Detecting injected behaviors in HTML5-based Android applications (1) 15– 34

Merlo, A., see Al-Haj Baddar, S. (1) 65– 76

Migliardi, M., see Al-Haj Baddar, S. (1) 65– 76

Narayan, D.G. and M. Uma, A cross-layer optimization for delay-aware load balancing in multi-radio wireless mesh networks (2) 77– 93

Nayak, A.K., see Prusty, A.R. (4) 265–280

Pervitsky, A.K., see Sukhov, A.M. (4) 321–333

Pradhan, A.K., K. Das, A. Ghosh and T. De, Resource efficient multicast traffic grooming in WDM mesh networks (2) 95–111

Prusty, A.R., S. Sethi and A.K. Nayak, A hybrid multi-hop mobility assisted heterogeneous energy efficient cluster routing protocol for Wireless Ad hoc Sensor Networks (4) 265–280

Qin, Y., see Ren, Z. (4) 281–291

Ren, Z., Y. Qin, Z. Zhao and J. Feng, A nonlinear dynamical chaotic signal reconstruction method in wireless sensor networks with unknown statistics (4) 281–291

Sethi, S., see Prusty, A.R. (4) 265–280

Sukhov, A.M., M.A. Astrakhantseva, A.K. Pervitsky, S.S. Boldyrev and A.A. Bukatov, Generating a function for network delay (4) 321–333

Tandjaoui, A.F. and M. Kaddour, A joint power control, time-sharing and routing scheme to minimize spectrum utilization in wireless mesh networks (3) 205–221

Tao, X., D. Kong and Y. Wang, A parallelized network traffic classification framework based on selective ensemble and diversity measures (1) 35– 42

Tong, W., see Ziyi, Y. (2) 169–176

Uma, M., see Narayan, D.G. (2) 77– 93

Wang, H., Z. Zheng, L. Wu and D. He, New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems (2) 153–167

Wang, K., see Yang, W.-D. (3) 223–230

Wang, Q., C. Hu, X. Wei, B. Xu and Y. Li, VAStream: Virtual adaptive substream partition and scheduling in data-driven P2P live streaming (2) 113–124

Wang, R., see Mao, J. (1) 15– 34

Wang, Y., see Tao, X. (1) 35– 42

Wei, X., see Wang, Q. (2) 113–124

Wu, L., see Wang, H. (2) 153–167

Xiao, X. and X. Zheng, A proposal of survivable virtual network embedding algorithm (3) 241–251

Xu, B., see Wang, Q. (2) 113–124

Xu, C., G.F. Zhao, Y. Liu and S.M.M. Gilani, Charactering network latency in China: A view from gateway (4) 253–264

Yang, W.-D., Z.-M. Gao, K. Wang and H.-Y. Liu, A privacy-preserving data aggregation mechanism for VANETs (3) 223–230

Yoon, H., see Kim, T. (4) 293–307

Yu, H., see Cai, F. (1) 43– 53

Zadkhosh, E., see Ahmadi, M. (3) 177–192

Zhao, G.F., see Xu, C. (4) 253–264

Zhao, Z., see Ren, Z. (4) 281–291

Zheng, X., see Xiao, X. (3) 241–251

Zheng, Z., see Wang, H. (2) 153–167

Zhili, X., see Ziyi, Y. (2) 169–176

Ziyi, Y., S. Jun, H. Daxiang, W. Tong and X. Zhili, Personality as a metric for topic models on social networks (2) 169–176