Journals in DBLP
Xiangjian He Editorial. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1273-1274 [Journal ] Shinichi Suzuki , Yasushi Shinjo , Toshio Hirotsu , Kozo Itano , Kazuhiko Kato Capability-based egress network access control by using DNS server. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1275-1282 [Journal ] Yanni Wu , Kuo Zhang , Xiaoge Wang , Jinlan Tian Extending metadata with scenarios in adaptive distributed system. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1283-1294 [Journal ] Michael J. Callaghan , Jim Harkin , E. McColgan , T. Martin McGinnity , Liam P. Maguire Client-server architecture for collaborative remote experimentation. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1295-1308 [Journal ] Carolyn McGregor , Bruce Kneale , Mark Tracy On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1309-1323 [Journal ] Wenjing Jia , Huaifeng Zhang , Xiangjian He Region-based license plate detection. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1324-1333 [Journal ] Hatice Gunes , Massimo Piccardi Bi-modal emotion recognition from expressive face and body gestures. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1334-1345 [Journal ] Junjun Xia , Lin Ni , Y. Miao A new digital implementation of ridgelet transform for images of dyadic length. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1346-1355 [Journal ] Donn Morrison , Liyanage C. De Silva Voting ensembles for spoken affect classification. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1356-1365 [Journal ] Ben-Nian Wang , Yang Gao , Zhao-Qian Chen , Jun-Yuan Xie , Shi-Fu Chen A two-layered multi-agent reinforcement learning model and algorithm. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1366-1376 [Journal ] Jung-San Lee , Chin-Chen Chang Secure communications for cluster-based ad hoc networks using node identities. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1377-1396 [Journal ] Christopher J. Martinez , Wei-Ming Lin , Parimal Patel Optimal XOR hashing for non-uniformly distributed address lookup in computer networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1397-1427 [Journal ] Bart Duysburgh , Thijs Lambrecht , Filip De Turck , Bart Dhoedt , Piet Demeester Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1428-1444 [Journal ] S. A. Al-Talib , Borhanuddin Mohd Ali , Sabira Khatun , Subramaniam Shamala Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1445-1454 [Journal ]