Volume 30,
Number 1,
January 2007
Special Issue on Network and Information Security:
A Computational Intelligence Approach
- Ajith Abraham, Kate A. Smith, Ravi Jain, Lakhmi C. Jain:
Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications.
1-3
- Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan:
VQ-based watermarking scheme with genetic codebook partition.
4-23
- Tai-Wen Yue, Suchen Chiang:
The semipublic encryption for visual cryptography using Q'tron neural networks.
24-41
- Gail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong:
Towards secure information sharing using role-based delegation.
42-59
- Yihua Liao, V. Rao Vemuri, Alejandro Pasos:
Adaptive anomaly detection with evolving connectionist systems.
60-80
- Ajith Abraham, Ravi Jain, Johnson P. Thomas, Sang-Yong Han:
D-SCIDS: Distributed soft computing intrusion detection system.
81-98
- Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening.
99-113
- Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson P. Thomas:
Modeling intrusion detection system using hybrid intelligent systems.
114-132
Regular Articles
- Ali El Kateeb:
High-speed routers design using data stream distributor unit.
133-144
- Hongsong Chen, Zhenzhou Ji, Mingzeng Hu, Fu Zhongchuan, Jiang Ruixiang:
Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol.
145-166
- Khong Neng Choong, B. M. Ali, V. Prakash, Yoke Chek Yee:
The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme.
167-185
- Hojjat Jafarpour, Nasser Yazdani, Navid Bazzaz-zadeh:
A scalable group communication mechanism for mobile agents.
186-208
- Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimitrios Gunopulos, Alex Delis:
Distributed middleware architectures for scalable media services.
209-243
- Tainchi Lu, Chinghao Hsu:
Mobile agents for information retrieval in hybrid simulation environment.
244-264
- Hui Guo, Guobin Shen, Zhiguang Wang, Shipeng Li:
Optimized streaming media proxy and its applications.
265-281
- Lei Guo, Hongfang Yu, Lemin Li:
Dynamic survivable algorithm for meshed WDM optical networks.
282-295
- Jenq-Shiou Leu, Yuan-Po Chi, Wei Kuan Shih:
Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS).
296-307
- Lijun Qian, Ning Song, Xiangfang Li:
Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach.
308-330
- Kwang-Sik Shin, Jin-Ha Jung, Jin Young Cheon, Sang-Bang Choi:
Real-time network monitoring scheme based on SNMP for dynamic information.
331-353
- Xiaobo Zhou, Jianbin Wei, Cheng-Zhong Xu:
Quality-of-service differentiation on the Internet: A taxonomy.
354-383
- Suneuy Kim, Chita R. Das:
An analytical model for interval caching in interactive video servers.
384-413
- Mohammad Saniee Abadeh, Jafar Habibi, Caro Lucas:
Intrusion detection using a fuzzy genetics-based learning algorithm.
414-428
Volume 30,
Number 2,
April 2007
- Rongxi He, Bin Lin, Lemin Li:
Dynamic service-level-agreement aware shared-path protection in WDM mesh networks.
429-444
- Bruce Stephen, Lykourgos Petropoulakis:
The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement.
445-465
- Wang Liang, Guo Yi-Ping, Fang Ming:
Web search engine based on DNS.
466-478
- Manuel Esteve, Carlos E. Palau, J. Martínez-Nohales, Benjamín Molina:
A video streaming application for urban traffic management.
479-498
- M. Can Filibeli, Öznur Özkasap, M. Reha Civanlar:
Embedded web server-based home appliance networks.
499-514
- Xiaobo Zhou, Cheng-Zhong Xu:
Efficient algorithms of video replication and placement on a cluster of streaming servers.
515-540
- Kenneth J. Turner:
Representing and analysing composed web services using Cress.
541-562
- Christos Bouras, Giorgos Kounenis, Ioannis Misedakis:
A web content manipulation technique based on page Fragmentation.
563-585
- Siti Z. Z. Abidin, Min Chen, Phil W. Grant:
Designing interaction protocols using noughts and crosses type games.
586-613
- Alejandro Quintero, Da Yu Li, Harold Castro:
A location routing protocol based on smart antennas for ad hoc networks.
614-636
- Yan Bai, Mabo Robert Ito:
A new technique for minimizing network loss from users' perspective.
637-649
- Lei Guo, Jin Cao, Hongfang Yu, Lemin Li:
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks.
650-661
- Chin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin:
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots.
662-676
- Jin Cao, Lei Guo, Hongfang Yu, Lemin Li:
A novel recursive shared segment protection algorithm in survivable WDM networks.
677-694
- Rongping Lin, Sheng Wang, Lemin Li:
Protections for multicast session in WDM optical networks under reliability constraints.
695-705
- Chan-Ho Min, Sehun Kim:
On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks.
706-727
- Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee:
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system.
728-749
- Kwang-Sik Shin, Jin-Ha Jung, Wan-Oh Yoon, Sang-Bang Choi:
P2P transfer of partial stream in multimedia multicast.
750-774
- Yiqun Xu, Luigi Logrippo, Jacques Sincennes:
Detecting feature interactions in CPL.
775-799
- Ibrahim Özçelik, Hüseyin Ekiz:
Building an interconnection between PROFIBUS and ATM networks.
800-817
Volume 30,
Number 3,
August 2007
Special issue on distributed denial-of-service and intrusion detection
- Xiaobo Zhou, Cheng-Zhong Xu:
Distributed denial-of-service and intrusion detection.
819-822
- Shigang Chen, Yong Tang, Wenliang Du:
Stateful DDoS attacks and targeted filtering.
823-840
- Matthias Bossardt, Thomas Dübendorfer, Bernhard Plattner:
Enhanced Internet security by a distributed traffic control service based on traffic ownership.
841-857
- Vasilios A. Siris, Ilias Stavrakis:
Provider-based deterministic packet marking against distributed DoS attacks.
858-876
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Information sharing for distributed intrusion detection systems.
877-899
- Gabriel López Millán, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Jesús D. Jiménez Re, Rafael Marín López:
A network access control approach based on the AAA architecture and authorization attributes.
900-919
- Celia Li, Cungang Yang, Richard Cheung:
Key management for role hierarchy in distributed systems.
920-936
- Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks.
937-954
Special issue on intelligence-based adaptation for ubiquitous multimedia communications
- George D. Magoulas, George Ghinea:
Intelligence-based adaptation for ubiquitous multimedia communications.
955-957
- Dietmar Jannach, Klaus Leopold:
Knowledge-based multimedia adaptation for ubiquitous multimedia consumption.
958-982
- Nicola Cranley, Philip Perry, Liam Murphy:
Dynamic content-based adaptation of streamed multimedia.
983-1006
- Michael J. O'Grady, Gregory M. P. O'Hare, C. Donaghey:
Delivering adaptivity through context-awareness.
1007-1033
- Vincent Charvillat, Romulus Grigoras:
Reinforcement learning for dynamic multimedia adaptation.
1034-1058
- Johan Bollen, Michael L. Nelson, Gary Geisler, Raquel Araujo:
Usage derived recommendations for a video digital library.
1059-1083
Innovations in agent collaboration,
cooperation and Teaming,
Part 2
- Gloria E. Phillips-Wren, Anders I. Mørch, Jeffrey Tweedale, Nikhil Ichalkaranje:
Innovations in agent collaboration, cooperation and Teaming, Part 2.
1085-1088
- Jeffrey Tweedale, Nikhil Ichalkaranje, Christos Sioutis, B. Jarvis, Angela Consoli, Gloria E. Phillips-Wren:
Innovations in multi-agent systems.
1089-1115
- Lin Padgham, Wei Liu:
Internet collaboration and service composition as a loose form of teamwork.
1116-1135
- Antonella Di Stefano, Giuseppe Pappalardo, Corrado Santoro, Emiliano Tramontana:
A framework for the design and automated implementation of communication aspects in multi-agent systems.
1136-1152
- Wei Xu, Jiannong Cao, Beihong Jin, Jing Li, Liang Zhang:
GCS-MA: A group communication system for mobile agents.
1153-1172
- Tom Wanyama, Behrouz Homayoun Far:
A protocol for multi-agent negotiation in a group-choice decision making process.
1173-1195
- Gerhard Weiß, Matthias Nickles, Michael Rovatsos, Felix A. Fischer:
Specifying the intertwining of cooperation and autonomy in agent-based systems.
1196-1215
- Justin Z. Zhan, Stan Matwin, LiWu Chang:
Privacy-preserving collaborative association rule mining.
1216-1227
- Abdelhamid Ouardani, Samuel Pierre, Hanifa Boucheneb:
A security protocol for mobile agents based upon the cooperation of sedentary agents.
1228-1243
- Ruth Aguilar-Ponce, Ashok Kumar, J. Luis Tecpanecatl-Xihuitl, Magdy Bayoumi:
A network of sensor-based framework for automated visual surveillance.
1244-1271
Volume 30,
Number 4,
November 2007
Special issue on Information technology
- Xiangjian He:
Editorial.
1273-1274
- Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-based egress network access control by using DNS server.
1275-1282
- Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian:
Extending metadata with scenarios in adaptive distributed system.
1283-1294
- Michael J. Callaghan, Jim Harkin, E. McColgan, T. Martin McGinnity, Liam P. Maguire:
Client-server architecture for collaborative remote experimentation.
1295-1308
- Carolyn McGregor, Bruce Kneale, Mark Tracy:
On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband.
1309-1323
- Wenjing Jia, Huaifeng Zhang, Xiangjian He:
Region-based license plate detection.
1324-1333
- Hatice Gunes, Massimo Piccardi:
Bi-modal emotion recognition from expressive face and body gestures.
1334-1345
- Junjun Xia, Lin Ni, Yuan Miao:
A new digital implementation of ridgelet transform for images of dyadic length.
1346-1355
- Donn Morrison, Liyanage C. De Silva:
Voting ensembles for spoken affect classification.
1356-1365
- Ben-Nian Wang, Yang Gao, Zhaoqian Chen, Jun-Yuan Xie, Shifu Chen:
A two-layered multi-agent reinforcement learning model and algorithm.
1366-1376
Regular articles
- Jung-San Lee, Chin-Chen Chang:
Secure communications for cluster-based ad hoc networks using node identities.
1377-1396
- Christopher J. Martinez, Wei-Ming Lin, Parimal Patel:
Optimal XOR hashing for non-uniformly distributed address lookup in computer networks.
1397-1427
- Bart Duysburgh, Thijs Lambrecht, Filip De Turck, Bart Dhoedt, Piet Demeester:
Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks.
1428-1444
- S. A. Al-Talib, Borhanuddin Mohd Ali, Sabira Khatun, Subramaniam Shamala:
Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast.
1445-1454
Copyright © Fri Mar 12 17:30:19 2010
by Michael Ley (ley@uni-trier.de)