The SCEAS System
Navigation Menu

Journals in DBLP

J. Network and Computer Applications
2007, volume: 30, number: 1

  1. Ajith Abraham, Kate A. Smith, Ravi Jain, Lakhmi C. Jain
    Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:1-3 [Journal]
  2. Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan
    VQ-based watermarking scheme with genetic codebook partition. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:4-23 [Journal]
  3. Tai-Wen Yue, Suchen Chiang
    The semipublic encryption for visual cryptography using Q'tron neural networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:24-41 [Journal]
  4. Gail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong
    Towards secure information sharing using role-based delegation. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:42-59 [Journal]
  5. Yihua Liao, V. Rao Vemuri, Alejandro Pasos
    Adaptive anomaly detection with evolving connectionist systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:60-80 [Journal]
  6. Ajith Abraham, Ravi Jain, Johnson Thomas, Sang-Yong Han
    D-SCIDS: Distributed soft computing intrusion detection system. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:81-98 [Journal]
  7. Tansel Özyer, Reda Alhajj, Ken Barker
    Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:99-113 [Journal]
  8. Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson P. Thomas
    Modeling intrusion detection system using hybrid intelligent systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:114-132 [Journal]
  9. Ali El Kateeb
    High-speed routers design using data stream distributor unit. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:133-144 [Journal]
  10. Hongsong Chen, Zhenzhou Ji, Mingzeng Hu, Fu Zhongchuan, Jiang Ruixiang
    Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:145-166 [Journal]
  11. Khong Neng Choong, B. M. Ali, V. Prakash, Yoke Chek Yee
    The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:167-185 [Journal]
  12. Hojjat Jafarpour, Nasser Yazdani, Navid Bazzaz-zadeh
    A scalable group communication mechanism for mobile agents. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:186-208 [Journal]
  13. Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimitrios Gunopulos, Alex Delis
    Distributed middleware architectures for scalable media services. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:209-243 [Journal]
  14. Tainchi Lu, Chinghao Hsu
    Mobile agents for information retrieval in hybrid simulation environment. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:244-264 [Journal]
  15. Hui Guo, Guobin Shen, Zhiguang Wang, Shipeng Li
    Optimized streaming media proxy and its applications. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:265-281 [Journal]
  16. Lei Guo, Hongfang Yu, Lemin Li
    Dynamic survivable algorithm for meshed WDM optical networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:282-295 [Journal]
  17. Jenq-Shiou Leu, Yuan-Po Chi, Wei-Kuan Shih
    Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS). [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:296-307 [Journal]
  18. Lijun Qian, Ning Song, Xiangfang Li
    Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:308-330 [Journal]
  19. Kwang-Sik Shin, Jin-Ha Jung, Jin Young Cheon, Sang-Bang Choi
    Real-time network monitoring scheme based on SNMP for dynamic information. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:331-353 [Journal]
  20. Xiaobo Zhou, Jianbin Wei, Cheng-Zhong Xu
    Quality-of-service differentiation on the Internet: A taxonomy. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:354-383 [Journal]
  21. Suneuy Kim, Chita R. Das
    An analytical model for interval caching in interactive video servers. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:384-413 [Journal]
  22. Mohammad Saniee Abadeh, Jafar Habibi, C. Lucas
    Intrusion detection using a fuzzy genetics-based learning algorithm. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:414-428 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002