Volume 31,
Number 1,
January 2008
Research note
Volume 31,
Number 2,
April 2008
Trends in peer to peer and service oriented computing
- Christos Makris, Athanasios K. Tsakalidis:
Trends in peer to peer and service oriented computing.
73-74
- Sinuhé Arroyo, Miguel-Ángel Sicilia, José Manuel López Cobo:
Patterns of message interchange in decoupled hypermedia systems.
75-92
- Serena Pastore:
The service discovery methods issue: A web services UDDI specification framework integrated in a grid environment.
93-107
- Vassiliki Diamadopoulou, Christos Makris, Yannis Panagis, Evangelos Sakkopoulos:
Techniques to support Web Service selection and consumption with QoS characteristics.
108-130
- Konstantinos Votis, Christos E. Alexakos, Bill Vassiliadis, Spiridon D. Likothanassis:
An ontologically principled service-oriented architecture for managing distributed e-government nodes.
131-148
- Spyros Sioutas, Evangelos Sakkopoulos, Lambros Drossos, Spiros Sirmakessis:
Balanced distributed web service lookup system.
149-162
- Sampath N. Ranasinghe, Vasilis Friderikos, Hamid Aghvami:
Dynamic proxy assisted mobility support for third generation peer-to-peer networks.
163-178
- Dimitris Kanellopoulos, Alkiviadis A. Panagopoulos:
Exploiting tourism destinations' knowledge in an RDF-based P2P network.
179-200
Volume 31,
Number 3,
August 2008
- Gwo-Jong Yu, Chih-Yung Chang:
Congestion control of bluetooth radio system by piconet restructuring.
201-223
- Dhouha Ayed, Chantal Taconet, Guy Bernard, Yolande Berbers:
CADeComp: Context-aware deployment of component-based applications.
224-257
- Li Chunlin, Li Layuan:
Cross-layer optimization policy for QoS scheduling in computational grid.
258-284
- Lin Chen, Changjun Jiang, Junjie Li:
VGITS: ITS based on intervehicle communication networks and grid technology.
285-302
- Luhua Liao, Lemin Li, Sheng Wang:
Multicast protection scheme in survivable WDM optical networks.
303-316
- James Lembke, Byung Kyu Choi:
Edge-limited scalable QoS flow set-up.
317-337
- Ferhat Khendek, Tong Zheng:
Modeling and analysis of value added services using message sequence charts.
338-356
Volume 31,
Number 4,
November 2008
- Javier Varona, Cristina Manresa-Yee, Francisco J. Perales López:
Hands-free vision-based interface for computer accessibility.
357-374
- Hongjun Liu, Ping Luo, Daoshun Wang:
A scalable authentication model based on public keys.
375-386
- Wen-Hwa Liao, Yucheng Kao, Chien-Ming Fan:
Data aggregation in wireless sensor networks using ant colony algorithm.
387-401
- Vidhyacharan Bhaskar, Patrick Lallement:
Activity routing in a distributed supply chain: Performance evaluation with two inputs.
402-428
- Bing Zheng, Mohammed Atiquzzaman:
A framework to determine bounds of maximum loss rate parameter of RED queue for next generation routers.
429-445
- K. Komathy, P. Narayanasamy:
Trust-based evolutionary game model assisting AODV routing against selfishness.
446-471
- Hongjun Liu, Ping Luo, Daoshun Wang:
A distributed expansible authentication model based on Kerberos.
472-486
- Carles Garrigues, Sergi Robles, Joan Borrell:
Securing dynamic itineraries for mobile agent applications.
487-508
- Haïdar Safa, Mohamad Chouman, Hassan Artail, Marcel Karam:
A collaborative defense mechanism against SYN flooding attacks in IP networks.
509-534
- Prasan Kumar Sahoo, Chih-Yung Chang, Sheng-Wen Chang:
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility.
535-558
- Weili Han, Xingdong Shi, Ronghua Chen:
Process-context aware matchmaking for web service composition.
559-576
- G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram:
An efficient resource allocation scheme for multimedia applications in MANET.
577-584
- Eric Gamess, Rina Surós:
An upper bound model for TCP and UDP throughput in IPv4 and IPv6.
585-602
- Yiouli Kritikou, Panagiotis Demestichas, Evgenia F. Adamopoulou, Konstantinos P. Demestichas, Michael E. Theologou, Maria Paradia:
User Profile Modeling in the context of web-based learning management systems.
603-627
- Venet Osmani, Sasitharan Balasubramaniam, Dmitri Botvich:
Human activity recognition in pervasive health-care: Supporting efficient remote collaboration.
628-655
- Pejman Khadivi, Shadrokh Samavi, Terence D. Todd:
Multi-constraint QoS routing using a new single mixed metrics.
656-676
- Beatriz Prieto, Fernando Tricas, Juan Julián Merelo Guervós, Antonio Mora, Alberto Prieto:
Visualizing the evolution of a web-based social network.
677-698
- Mouhammd Al-Kasassbeh, Mo Adda:
Analysis of mobile agents in network fault management.
699-711
- Janus S. Liang:
The troubleshooting task implementation in automotive chassis using virtual interactive technique and knowledge-based approach.
712-734
- Xiangyang Wang, Panpan Niu, Wei Qi:
A new adaptive digital audio watermarking based on support vector machine.
735-749
- Hussein Abdel-jaber, Michael E. Woodward, Fadi A. Thabtah, Amer Abu-Ali:
Performance evaluation for DRED discrete-time queueing network analytical model.
750-770
- Yoke Chek Yee, Khong Neng Choong, Andy Lock Yen Low, S. W. Tan:
SIP-based proactive and adaptive mobility management framework for heterogeneous networks.
771-792
- Juan J. Samper, Pedro A. Castillo, Lourdes Araujo, Juan Julián Merelo Guervós, Oscar Cordón, Fernando Tricas:
NectaRSS, an intelligent RSS feed reader.
793-806
- Wen-Hwa Liao, Hsiao-Hsien Wang:
An asynchronous MAC protocol for wireless sensor networks.
807-820
- Jianjun Zhang, Ling Liu, Lakshmish Ramaswamy, Calton Pu:
PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks.
821-850
- Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
Secure DACS Scheme.
851-861
- Javed I. Khan, Sajid S. Shaikh:
Computing in social networks with relationship algebra.
862-878
- Ibrahim Özçelik:
Interconnection of CAN segments through IEEE 802.16 wireless MAN.
879-890
- Bhuvan Urgaonkar, Prashant J. Shenoy:
Cataclysm: Scalable overload policing for internet applications.
891-920
- Khaled Salah, Prasad Calyam, M. I. Buhari:
Assessing readiness of IP networks to support desktop videoconferencing using OPNET.
921-943
- Haibin Cai, Fang Pu, Runcai Huang, Qiying Cao:
A novel ANN-based service selection model for ubiquitous computing environments.
944-965
- Eleni Georgiou, Marios D. Dikaiakos, Athena Stassopoulou:
On the properties of spam-advertised URL addresses.
966-985
Copyright © Fri Mar 12 17:30:19 2010
by Michael Ley (ley@uni-trier.de)