The SCEAS System
Navigation Menu

Journals in DBLP

J. Network and Computer Applications
2007, volume: 30, number: 3

  1. Xiaobo Zhou, Cheng-Zhong Xu
    Distributed denial-of-service and intrusion detection. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:819-822 [Journal]
  2. Shigang Chen, Yong Tang, Wenliang Du
    Stateful DDoS attacks and targeted filtering. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:823-840 [Journal]
  3. Matthias Bossardt, Thomas Dübendorfer, Bernhard Plattner
    Enhanced Internet security by a distributed traffic control service based on traffic ownership. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:841-857 [Journal]
  4. Vasilios A. Siris, Ilias Stavrakis
    Provider-based deterministic packet marking against distributed DoS attacks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:858-876 [Journal]
  5. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Information sharing for distributed intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:877-899 [Journal]
  6. Gabriel López Millán, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Jesús D. Jiménez, Rafael Marín
    A network access control approach based on the AAA architecture and authorization attributes. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:900-919 [Journal]
  7. Celia Li, Cungang Yang, Richard Cheung
    Key management for role hierarchy in distributed systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:920-936 [Journal]
  8. Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras
    Secure and efficient key management in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:937-954 [Journal]
  9. George D. Magoulas, George Ghinea
    Intelligence-based adaptation for ubiquitous multimedia communications. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:955-957 [Journal]
  10. Dietmar Jannach, Klaus Leopold
    Knowledge-based multimedia adaptation for ubiquitous multimedia consumption. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:958-982 [Journal]
  11. Nicola Cranley, Philip Perry, Liam Murphy
    Dynamic content-based adaptation of streamed multimedia. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:983-1006 [Journal]
  12. Michael J. O'Grady, Gregory M. P. O'Hare, C. Donaghey
    Delivering adaptivity through context-awareness. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1007-1033 [Journal]
  13. Vincent Charvillat, Romulus Grigoras
    Reinforcement learning for dynamic multimedia adaptation. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1034-1058 [Journal]
  14. Johan Bollen, Michael L. Nelson, Gary Geisler, Raquel Araujo
    Usage derived recommendations for a video digital library. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1059-1083 [Journal]
  15. Gloria E. Phillips-Wren, Anders I. Mørch, Jeffrey Tweedale, Nikhil Ichalkaranje
    Innovations in agent collaboration, cooperation and Teaming, Part 2. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1085-1088 [Journal]
  16. Jeffrey Tweedale, Nikhil Ichalkaranje, Christos Sioutis, B. Jarvis, Angela Consoli, Gloria E. Phillips-Wren
    Innovations in multi-agent systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1089-1115 [Journal]
  17. Lin Padgham, Wei Liu
    Internet collaboration and service composition as a loose form of teamwork. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1116-1135 [Journal]
  18. Antonella Di Stefano, Giuseppe Pappalardo, Corrado Santoro, Emiliano Tramontana
    A framework for the design and automated implementation of communication aspects in multi-agent systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1136-1152 [Journal]
  19. Wei Xu, Jiannong Cao, Beihong Jin, Jing Li, Liang Zhang
    GCS-MA: A group communication system for mobile agents. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1153-1172 [Journal]
  20. Tom Wanyama, Behrouz Homayoun Far
    A protocol for multi-agent negotiation in a group-choice decision making process. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1173-1195 [Journal]
  21. Gerhard Weiß, Matthias Nickles, Michael Rovatsos, Felix Fischer
    Specifying the intertwining of cooperation and autonomy in agent-based systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1196-1215 [Journal]
  22. Justin Zhan, Stan Matwin, LiWu Chang
    Privacy-preserving collaborative association rule mining. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1216-1227 [Journal]
  23. Abdelhamid Ouardani, Samuel Pierre, Hanifa Boucheneb
    A security protocol for mobile agents based upon the cooperation of sedentary agents. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1228-1243 [Journal]
  24. Ruth Aguilar-Ponce, Ashok Kumar, J. Luis Tecpanecatl-Xihuitl, Magdy Bayoumi
    A network of sensor-based framework for automated visual surveillance. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1244-1271 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002