The SCEAS System
Navigation Menu

Journals in DBLP

J. Network and Computer Applications
2007, volume: 30, number: 4

  1. Xiangjian He
    Editorial. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1273-1274 [Journal]
  2. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
    Capability-based egress network access control by using DNS server. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1275-1282 [Journal]
  3. Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian
    Extending metadata with scenarios in adaptive distributed system. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1283-1294 [Journal]
  4. Michael J. Callaghan, Jim Harkin, E. McColgan, T. Martin McGinnity, Liam P. Maguire
    Client-server architecture for collaborative remote experimentation. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1295-1308 [Journal]
  5. Carolyn McGregor, Bruce Kneale, Mark Tracy
    On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1309-1323 [Journal]
  6. Wenjing Jia, Huaifeng Zhang, Xiangjian He
    Region-based license plate detection. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1324-1333 [Journal]
  7. Hatice Gunes, Massimo Piccardi
    Bi-modal emotion recognition from expressive face and body gestures. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1334-1345 [Journal]
  8. Junjun Xia, Lin Ni, Y. Miao
    A new digital implementation of ridgelet transform for images of dyadic length. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1346-1355 [Journal]
  9. Donn Morrison, Liyanage C. De Silva
    Voting ensembles for spoken affect classification. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1356-1365 [Journal]
  10. Ben-Nian Wang, Yang Gao, Zhao-Qian Chen, Jun-Yuan Xie, Shi-Fu Chen
    A two-layered multi-agent reinforcement learning model and algorithm. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1366-1376 [Journal]
  11. Jung-San Lee, Chin-Chen Chang
    Secure communications for cluster-based ad hoc networks using node identities. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1377-1396 [Journal]
  12. Christopher J. Martinez, Wei-Ming Lin, Parimal Patel
    Optimal XOR hashing for non-uniformly distributed address lookup in computer networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1397-1427 [Journal]
  13. Bart Duysburgh, Thijs Lambrecht, Filip De Turck, Bart Dhoedt, Piet Demeester
    Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1428-1444 [Journal]
  14. S. A. Al-Talib, Borhanuddin Mohd Ali, Sabira Khatun, Subramaniam Shamala
    Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1445-1454 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002