Table of contents for issues of Journal of Network and Computer Applications

Last update: Tue Sep 3 09:12:14 MDT 2024                Valid HTML 3.2!

Volume 19, Number 1, January, 1996
Volume 19, Number 2, April, 1996
Volume 19, Number 3, July, 1996
Volume 19, Number 4, October, 1996
Volume 20, Number 1, January, 1997
Volume 20, Number 2, April, 1997
Volume 20, Number 3, July, 1997
Volume 20, Number 4, October, 1997
Volume 21, Number 1, January, 1998
Volume 21, Number 2, April, 1998
Volume 21, Number 3, July, 1998
Volume 21, Number 4, October, 1998
Volume 22, Number 1, January, 1999
Volume 22, Number 2, April, 1999
Volume 22, Number 3, July, 1999
Volume 22, Number 4, October, 1999
Volume 23, Number 1, January, 2000
Volume 23, Number 2, April, 2000
Volume 23, Number 3, July, 2000
Volume 23, Number 4, October, 2000
Volume 24, Number 1, January, 2001
Volume 24, Number 2, April, 2001
Volume 24, Number 3, July, 2001
Volume 24, Number 4, October, 2001
Volume 25, Number 1, January, 2002
Volume 25, Number 2, April, 2002
Volume 25, Number 3, July, 2002
Volume 25, Number 4, October, 2002
Volume 26, Number 1, January, 2003
Volume 26, Number 2, April 1, 2003
Volume 26, Number 3, 2003
Volume 26, Number 4, November, 2003
Volume 27, Number 1, January, 2004
Volume 27, Number 2, April, 2004
Volume 27, Number 3, August, 2004
Volume 27, Number 4, November, 2004
Volume 28, Number 1, January, 2005
Volume 28, Number 2, April, 2005
Volume 28, Number 3, August, 2005
Volume 28, Number 4, November, 2005
Volume 29, Number 1, January, 2006
Volume 29, Number 2--3, August / April, 2005/2006
Volume 29, Number 4, November, 2006
Volume 30, Number 1, January, 2007
Volume 30, Number 2, April, 2007
Volume 30, Number 3, August, 2007
Volume 30, Number 4, November, 2007
Volume 31, Number 1, January, 2008
Volume 31, Number 2, April, 2008
Volume 31, Number 3, August, 2008
Volume 31, Number 4, November, 2008
Volume 32, Number 1, January, 2009
Volume 32, Number 2, March, 2009
Volume 32, Number 3, May, 2009
Volume 32, Number 4, July, 2009
Volume 32, Number 5, September, 2009
Volume 32, Number 6, November, 2009
Volume 33, Number 1, January, 2010
Volume 33, Number 2, March, 2010
Volume 33, Number 3, May, 2010
Volume 33, Number 4, July, 2010
Volume 33, Number 5, September, 2010
Volume 33, Number 6, November, 2010
Volume 34, Number 1, January, 2011
Volume 34, Number 2, March, 2011
Volume 34, Number 3, May, 2011
Volume 34, Number 4, July, 2011
Volume 34, Number 5, September, 2011
Volume 34, Number 6, November, 2011
Volume 35, Number 1, January, 2012
Volume 35, Number 2, March, 2012
Volume 35, Number 3, May, 2012
Volume 35, Number 4, July, 2012
Volume 35, Number 5, September, 2012
Volume 35, Number 6, November, 2012
Volume 36, Number 1, January, 2013
Volume 36, Number 2, March, 2013
Volume 36, Number 3, May, 2013
Volume 36, Number 4, July, 2013
Volume 36, Number 5, September, 2013
Volume 36, Number 6, November, 2013
Volume 37, Number ??, January, 2014
Volume 38, Number ??, February, 2014
Volume 39, Number ??, March, 2014
Volume 40, Number ??, April, 2014
Volume 40, Number 0, April, 2014
Volume 40, Number ??, April, 2014
Volume 41, Number ??, May, 2014
Volume 42, Number ??, June, 2014
Volume 43, Number ??, August, 2014
Volume 44, Number ??, September, 2014
Volume 45, Number ??, October, 2014
Volume 46, Number ??, November, 2014
Volume 47, Number ??, January, 2015
Volume 48, Number ??, February, 2015
Volume 49, Number ??, March, 2015
Volume 50, Number ??, April, 2015
Volume 51, Number ??, May, 2015
Volume 52, Number ??, June, 2015
Volume 53, Number ??, July, 2015
Volume 54, Number ??, August, 2015
Volume 55, Number ??, September, 2015
Volume 56, Number ??, October, 2015
Volume 57, Number ??, November, 2015
Volume 58, Number ??, December, 2015
Volume 59, Number ??, January, 2016
Volume 60, Number ??, January, 2016
Volume 61, Number ??, February, 2016
Volume 62, Number ??, February, 2016
Volume 63, Number ??, March, 2016
Volume 64, Number ??, April, 2016
Volume 65, Number ??, April, 2016
Volume 66, Number ??, May, 2016
Volume 67, Number ??, May, 2016
Volume 68, Number ??, June, 2016
Volume 69, Number ??, July, 2016
Volume 70, Number ??, July, 2016
Volume 71, Number ??, August, 2016
Volume 72, Number ??, September, 2016
Volume 73, Number ??, September, 2016
Volume 74, Number ??, October, 2016
Volume 75, Number ??, November, 2016
Volume 76, Number ??, December, 2016
Volume 77, Number ??, January 1, 2017
Volume 78, Number ??, January 15, 2017
Volume 79, Number ??, February 1, 2017
Volume 80, Number ??, February 15, 2017
Volume 81, Number ??, March 1, 2017
Volume 82, Number ??, March 15, 2017
Volume 83, Number ??, April 1, 2017
Volume 84, Number ??, April 15, 2017
Volume 85, Number ??, May 1, 2017
Volume 86, Number ??, May 15, 2017
Volume 87, Number ??, June 1, 2017
Volume 88, Number ??, June 15, 2017
Volume 89, Number ??, July 1, 2017
Volume 90, Number ??, July 15, 2017
Volume 91, Number ??, August 1, 2017
Volume 92, Number ??, August 15, 2017
Volume 93, Number ??, September 1, 2017
Volume 94, Number ??, September 15, 2017
Volume 95, Number ??, October 1, 2017
Volume 96, Number ??, October 15, 2017
Volume 97, Number ??, November 1, 2017
Volume 98, Number ??, November 15, 2017
Volume 99, Number ??, December 1, 2017
Volume 100, Number ??, December 15, 2017
Volume 101, Number ??, January 1, 2018
Volume 102, Number ??, January 15, 2018
Volume 103, Number ??, February 1, 2018
Volume 104, Number ??, February 15, 2018
Volume 105, Number ??, March 1, 2018
Volume 106, Number ??, March 15, 2018
Volume 107, Number ??, April 1, 2018
Volume 108, Number ??, April 15, 2018
Volume 109, Number ??, May 1, 2018
Volume 110, Number ??, May 15, 2018
Volume 111, Number ??, June 1, 2018
Volume 112, Number ??, June 15, 2018
Volume 113, Number ??, July 1, 2018
Volume 114, Number ??, July 15, 2018
Volume 115, Number ??, August 1, 2018
Volume 116, Number ??, August 15, 2018
Volume 117, Number ??, September 1, 2018
Volume 118, Number ??, September 15, 2018
Volume 119, Number ??, October 1, 2018
Volume 120, Number ??, October 15, 2018
Volume 121, Number ??, November 1, 2018
Volume 122, Number ??, November 15, 2018
Volume 123, Number ??, December 1, 2018
Volume 124, Number ??, December 15, 2018
Volume 125, Number ??, January 1, 2019
Volume 126, Number ??, January 15, 2019
Volume 127, Number ??, February 1, 2019
Volume 128, Number ??, February 15, 2019
Volume 129, Number ??, March 1, 2019
Volume 130, Number ??, March 15, 2019
Volume 131, Number ??, April 1, 2019
Volume 132, Number ??, April 15, 2019
Volume 133, Number ??, May 1, 2019
Volume 134, Number ??, May 15, 2019
Volume 135, Number ??, June 1, 2019
Volume 136, Number ??, June 15, 2019
Volume 137, Number ??, July 1, 2019
Volume 138, Number ??, July 15, 2019
Volume 139, Number ??, August 1, 2019
Volume 140, Number ??, August 15, 2019
Volume 141, Number ??, September 1, 2019
Volume 142, Number ??, September 15, 2019
Volume 143, Number ??, October 1, 2019
Volume 144, Number ??, October 15, 2019
Volume 145, Number ??, 2019
Volume 146, Number ??, 2019
Volume 147, Number ??, December 1, 2019
Volume 148, Number ??, December 15, 2019
Volume 149, Number ??, January 1, 2020
Volume 150, Number ??, January 15, 2020
Volume 151, Number ??, February 1, 2020
Volume 152, Number ??, February 15, 2020
Volume 153, Number ??, March 1, 2020
Volume 154, Number ??, March 15, 2020
Volume 155, Number ??, April 1, 2020
Volume 156, Number ??, April 15, 2020
Volume 157, Number ??, May 1, 2020
Volume 158, Number ??, May 15, 2020
Volume 159, Number ??, June 1, 2020
Volume 160, Number ??, June 15, 2020
Volume 161, Number ??, July 1, 2020
Volume 162, Number ??, July 15, 2020
Volume 163, Number ??, August 1, 2020
Volume 164, Number ??, August 15, 2020
Volume 165, Number ??, September 1, 2020
Volume 166, Number ??, September 15, 2020
Volume 167, Number ??, October 1, 2020
Volume 168, Number ??, October 15, 2020
Volume 169, Number ??, November 1, 2020
Volume 170, Number ??, November 15, 2020
Volume 171, Number ??, December 1, 2020
Volume 172, Number ??, December 15, 2020
Volume 173, Number ??, January 1, 2021
Volume 174, Number ??, January 15, 2021
Volume 175, Number ??, February 1, 2021
Volume 176, Number ??, February 15, 2021
Volume 177, Number ??, March 1, 2021
Volume 178, Number ??, March 15, 2021
Volume 179, Number ??, April 1, 2021
Volume 180, Number ??, April 15, 2021
Volume 181, Number ??, May 1, 2021
Volume 182, Number ??, May 15, 2021
Volume 183--184, Number ??, June 1, 2021
Volume 185, Number ??, July 1, 2021
Volume 186, Number ??, July 15, 2021
Volume 187, Number ??, August 1, 2021
Volume 188, Number ??, August 15, 2021
Volume 189, Number ??, September 1, 2021
Volume 190, Number ??, September 15, 2021
Volume 191, Number ??, October 1, 2021
Volume 192, Number ??, October 15, 2021
Volume 193, Number ??, November 1, 2021
Volume 194, Number ??, November 15, 2021
Volume 195, Number ??, December 1, 2021
Volume 196, Number ??, December 15, 2021
Volume 197, Number ??, January, 2022
Volume 198, Number ??, February, 2022
Volume 199, Number ??, March, 2022
Volume 200, Number ??, April, 2022
Volume 201, Number ??, May, 2022
Volume 202, Number ??, June, 2022
Volume 203, Number ??, July, 2022
Volume 204, Number ??, August, 2022
Volume 205, Number ??, September, 2022
Volume 206, Number ??, October, 2022
Volume 207, Number ??, November, 2022
Volume 208, Number ??, December, 2022
Volume 209, Number ??, January, 2023
Volume 210, Number ??, January, 2023
Volume 211, Number ??, February, 2023
Volume 212, Number ??, March, 2023
Volume 213, Number ??, April, 2023
Volume 214, Number ??, May, 2023
Volume 215, Number ??, June, 2023
Volume 216, Number ??, July, 2023
Volume 217, Number ??, August, 2023
Volume 218, Number ??, September, 2023
Volume 219, Number ??, October, 2023
Volume 220, Number ??, November, 2023
Volume 221, Number ??, January, 2024
Volume 222, Number ??, February, 2024
Volume 223, Number ??, March, 2024
Volume 224, Number ??, April, 2024
Volume 225, Number ??, May, 2024
Volume 226, Number ??, June, 2024
Volume 227, Number ??, July, 2024
Volume 228, Number ??, August, 2024
Volume 229, Number ??, September, 2024
Volume 230, Number ??, October, 2024
Volume 231, Number ??, November, 2024


Journal of Network and Computer Applications
Volume 19, Number 1, January, 1996

                 Hermann Maurer   Editorial  . . . . . . . . . . . . . . . 1
                     L. C. Jain   Editorial  . . . . . . . . . . . . . . . 3
              Herbert Dawid and   
                    Kurt Hornik   The dynamics of genetic algorithms in
                                  interactive environments . . . . . . . . 5--19
                Charles L. Karr   Adaptive process control using
                                  biological paradigms . . . . . . . . . . 21--44
              Kaihei Kuwata and   
              Yuji Kajitani and   
          Masahide Watanabe and   
                   Ryu Katayama   Chaos simulator as a developing tool and
                                  a research environment for applications
                                  of chaos engineering . . . . . . . . . . 45--66
                Ranjit Bose and   
              Vijayan Sugumaran   Knowledge-based approach to domain
                                  modeling: organizational process
                                  modeling application . . . . . . . . . . 67--89
            Dinesh P. Mital and   
            Eam Khwang Teoh and   
                P. N. Suganthan   Learning parameters for object
                                  recognition by the self-organizing
                                  Hopfield network . . . . . . . . . . . . 91--108

Journal of Network and Computer Applications
Volume 19, Number 2, April, 1996

                     L. C. Jain   Guest Editorial: Intelligent systems:
                                  design and applications. Part 2  . . . . 109
     David V. Sánchez A.   On the design of a class of neural
                                  networks . . . . . . . . . . . . . . . . 111--118
  Ferda N. Civelek-Alpaslan and   
            Kathleen M. Swigger   A temporal neural network model for
                                  constructing connectionist expert system
                                  knowledge bases  . . . . . . . . . . . . 119--133
          Krishna Kottathra and   
             Yianni Attikiouzel   A novel multicriteria optimization
                                  algorithm for the structure
                                  determination of multilayer feedforward
                                  neural networks  . . . . . . . . . . . . 135--147
            Ibikunle Ashiru and   
            Chris Czarnecki and   
                     Tom Routen   Characteristics of a genetic based
                                  approach to path planning for mobile
                                  robots . . . . . . . . . . . . . . . . . 149--169
       Walter Cedeño and   
                  Rao V. Vemuri   Genetic algorithms in aquifer management 171--187
               John E. Hunt and   
                Denise E. Cooke   Learning using an artificial immune
                                  system . . . . . . . . . . . . . . . . . 189--212
               Larry R. Medsker   Microcomputer applications of hybrid
                                  intelligent systems  . . . . . . . . . . 213--234

Journal of Network and Computer Applications
Volume 19, Number 3, July, 1996

                     Yi Pan and   
                   Mounir Hamdi   Singular value decomposition on
                                  processor arrays with a pipelined bus
                                  system . . . . . . . . . . . . . . . . . 235--248
              J. M. Kuhlman and   
                    M. J. Lyell   Development of a user-friendly software
                                  planning tool to assess effects of
                                  biofilm activity on contaminant
                                  reduction in streams . . . . . . . . . . 249--264
                   Sun-Teck Tan   Architecture of a generic instructional
                                  planner  . . . . . . . . . . . . . . . . 265--274
               N. Bourbakis and   
                 N. Pereira and   
                   S. Mertoguno   Hardware design of a letter-driven OCR
                                  and document processing system . . . . . 275--294
              Jian Tao Wang and   
                Dinesh P. Mital   A microcomputer-based prototype for ECG
                                  paper record conversion  . . . . . . . . 295--307
              Gokul Rajaram and   
                   V. Rajaraman   A probabilistic method for calculating
                                  hit ratios in direct mapped caches . . . 309--319
             K. Padmanabhan and   
               D. Nedumaran and   
                     S. Ananthi   Bedside monitor for combined ECG and
                                  ultrasound Doppler-echo observations
                                  using a microprocessor . . . . . . . . . 321--334

Journal of Network and Computer Applications
Volume 19, Number 4, October, 1996

                      Anonymous   Index  . . . . . . . . . . . . . . . . . i--vi
           P. G. O'Donoghue and   
                   M. H. Murphy   Object modelling and formal
                                  specification during real-time system
                                  development  . . . . . . . . . . . . . . 335--352
              Roger Nkambou and   
                Gilles Gauthier   Integrating WWW resources in an
                                  Intelligent Tutoring System  . . . . . . 353--366
           Hueyching Janice Jih   The impact of learners' pathways on
                                  learning performance in multimedia
                                  Computer Aided Learning  . . . . . . . . 367--380
             Daniel J. Helm and   
         Raymond J. D'Amore and   
                   Puck-Fai Yan   MIDS: a framework for information
                                  organization and discovery . . . . . . . 381--394
                    K. Maly and   
                    C. Wild and   
           C. M. Overstreet and   
             H. Abdel-Wahab and   
                   A. Gupta and   
                 A. Youssef and   
                  E. Stoica and   
                   R. Talla and   
                      A. Prabhu   Interactive remote instruction: lessons
                                  learned  . . . . . . . . . . . . . . . . 395--404
               D. Radhakrishnan   A microcontroller based pacemaker tester 405--413
            Benjamin Singer and   
                    George Saon   An efficient algorithm for parallel
                                  integer multiplication . . . . . . . . . 415--418


Journal of Network and Computer Applications
Volume 20, Number 1, January, 1997

                      Anonymous   Guest Editorial: Special issue of JNCA
                                  on the digital libraries . . . . . . . . 1--2
                Ee-Peng Lim and   
                        Ying Lu   Integrated queries to existing
                                  bibliographic and structured databases   3--24
            Shigeo Sugimoto and   
                Akira Maeda and   
           Tetsuo Sakaguchi and   
              Koichi Tabata and   
                Takehisa Fujita   Experimental studies on software tools
                                  to enhance accessibility to information
                                  in digital libraries . . . . . . . . . . 25--44
  Alfredo J. Sánchez and   
                John J. Leggett   Agent services for users of digital
                                  libraries  . . . . . . . . . . . . . . . 45--58
          Klaus Tochtermann and   
              Thomas Alders and   
                Andreas Seifert   DogitaLS1: the Dortmund digital library
                                  system . . . . . . . . . . . . . . . . . 59--73
               Gene Alloway and   
                 Nathan Bos and   
             Kathleen Hamel and   
            Tracy Hammerman and   
            Elisabeth Klann and   
             Joseph Krajcik and   
                David Lyons and   
               Terry Madden and   
          Jon Margerum-Leys and   
                 James Reed and   
                Nancy Scala and   
             Elliot Soloway and   
              Ioanna Vekiri and   
                  Raven Wallace   Creating an inquiry-learning environment
                                  using the World Wide Web . . . . . . . . 75--85
            John L. Schnase and   
            Deborah L. Kama and   
           Kay L. Tomlinson and   
José Alfredo Sánchez and   
          Edward L. Cunnius and   
                 Nancy R. Morin   The Flora of North America digital
                                  library: a case study in biodiversity
                                  database publishing  . . . . . . . . . . 87--103

Journal of Network and Computer Applications
Volume 20, Number 2, April, 1997

                   Gerald Tripp   On the design of an ATM interface with
                                  facilities for traffic monitoring and
                                  generation . . . . . . . . . . . . . . . 105--121
              Paul Losleben and   
              Alice S. Tull and   
                    Erming Zhou   Help-Exchange: an arbitrated system for
                                  a help network . . . . . . . . . . . . . 123--134
          Richard H. Fowler and   
         Wendy A. L. Fowler and   
              Jorge L. Williams   $3$D visualization of WWW semantic
                                  content for browsing and query
                                  formulation  . . . . . . . . . . . . . . 135--149
       Daniel R. Bielenberg and   
            Ted Carpenter-Smith   Efficacy of story in multimedia training 151--159
                  B. S. Lee and   
              T. K. Y. Chan and   
                    P. C. Leong   A `pay-as-you-use' controller for
                                  networked laser printers . . . . . . . . 161--169
                  S. C. Hui and   
                 K. Y. Chan and   
                     G. Y. Qian   Distributed fax message processing
                                  system . . . . . . . . . . . . . . . . . 171--190
                 L. P. Khoo and   
                      M. Y. Teo   A prototype fuzzy-based classifier
                                  system for trajectory planning . . . . . 191--202
                   Hock C. Chan   Visual query languages for entity
                                  relationship model databases . . . . . . 203--221

Journal of Network and Computer Applications
Volume 20, Number 3, July, 1997

                    Sumit Ghosh   An asynchronous approach to efficient
                                  execution of programs on adaptive
                                  architectures utilizing FPGAs  . . . . . 223--252
         Ellen Yu Borkowski and   
                David Henry and   
             Lida L. Larsen and   
                 Deborah Mateik   Supporting teaching and learning via the
                                  Web: transforming hard-copy linear
                                  mindsets into Web-flexible creative
                                  thinking . . . . . . . . . . . . . . . . 253--265
              Jianying Zhou and   
                Dieter Gollmann   Evidence and non-repudiation . . . . . . 267--281
                  Renji Tao and   
                    Shihua Chen   A variant of the public key cryptosystem
                                  FAPKC3 . . . . . . . . . . . . . . . . . 283--303
           H. J. Schumacher and   
                    Sumit Ghosh   A fundamental framework for network
                                  security . . . . . . . . . . . . . . . . 305--322

Journal of Network and Computer Applications
Volume 20, Number 4, October, 1997

                      Anonymous   Index and Contents to Volume 20  . . . . i--x
                Holger Bock and   
       Wolfgang Mayerwieser and   
              Karl C. Posch and   
             Reinhard Posch and   
               Volker Schindler   An integrated co-processor architecture
                                  for a smartcard  . . . . . . . . . . . . 323--337
            Sandra L. Esler and   
              Michael L. Nelson   NASA indexing benchmarks: evaluating
                                  text search engines  . . . . . . . . . . 339--353
            Michal Iglewski and   
            Tomasz Müldner   Comparison of formal specification
                                  methods and object-oriented paradigms    355--377
              Don E. George and   
                      E. Salari   Real-time pitch extraction of voiced
                                  speech . . . . . . . . . . . . . . . . . 379--387
               Schubert Foo and   
                 Siu Cheung Hui   Delivery of video mail on the World Wide
                                  Web  . . . . . . . . . . . . . . . . . . 389--403
            Bernhard Leisch and   
               Peter Schuhmayer   An architecture for distributed
                                  visualization of technical processes . . 405--420


Journal of Network and Computer Applications
Volume 21, Number 1, January, 1998

                  Guojun Lu and   
                   Chester Kang   An efficient communication scheme for
                                  media on-demand services with hard QoS
                                  guarantees . . . . . . . . . . . . . . . 1--15
               P. Blenkhorn and   
                    D. G. Evans   Using speech and touch to enable blind
                                  people to access schematic diagrams  . . 17--29
             Nader Mir-Fakhraei   An efficient multicast approach in an
                                  ATM switching network for multimedia
                                  applications . . . . . . . . . . . . . . 31--39
               Ee-Luang Ang and   
                  Syin Chan and   
                    Bu-Sung Lee   Deployment of VCR services on a computer
                                  network  . . . . . . . . . . . . . . . . 41--52
             Mark Ratcliffe and   
                Tim Paul Davies   Using MBone technology to support a
                                  framework for a remote advisory service  53--68

Journal of Network and Computer Applications
Volume 21, Number 2, April, 1998

                 Imran Khan and   
                 Howard C. Card   Adaptive information agents using
                                  competitive learning . . . . . . . . . . 69--89
                  N. Vlajic and   
                     H. C. Card   Categorizing Web pages on the subject of
                                  neural networks  . . . . . . . . . . . . 91--105
           Sherali Zeadally and   
                     Weiyou Cui   Experiences with multimedia applications
                                  over native ATM  . . . . . . . . . . . . 107--123
                  E. C. Tan and   
                   A. Wahab and   
                     H. W. Yong   Interfacing reprogrammable universal
                                  remote controller with multimedia PC . . 125--134
             C. C. Charlton and   
                 P. H. Leng and   
                R. K. Lloyd and   
                    R. Turnbull   The use of macroprocessing for Web site
                                  standardization  . . . . . . . . . . . . 135--148
                Gerard Parr and   
                   Kevin Curran   Optimal multimedia transport on the
                                  Internet . . . . . . . . . . . . . . . . 149--161

Journal of Network and Computer Applications
Volume 21, Number 3, July, 1998

          Johnny S. K. Wong and   
                Rishi Nayar and   
                Armin R. Mikler   A framework for a World Wide Web-based
                                  Data Mining system . . . . . . . . . . . 163--185
               P. C. Saxena and   
                  Sangita Gupta   A performance comparison of token- and
                                  tree-based mutual exclusion algorithms
                                  on Chordal Rings . . . . . . . . . . . . 187--201
                 K. V. Chin and   
                  S. C. Hui and   
                         S. Foo   Enhancing the quality of Internet voice
                                  communication for Internet telephony
                                  systems  . . . . . . . . . . . . . . . . 203--218

Journal of Network and Computer Applications
Volume 21, Number 4, October, 1998

                      Anonymous   Contents and Index to Volume 21  . . . . i--viii
               Bor Prihavec and   
                   Franc Solina   User interface for video observation
                                  over the Internet  . . . . . . . . . . . 219--237
          Nikolas M. Mitrou and   
       Konstantine Kavidopoulos   Traffic engineering using a class of
                                  M/G/1 models . . . . . . . . . . . . . . 239--271
            Nasser-Eddine Rikli   An effective model for VBR video with
                                  application to an ATM multiplexer  . . . 273--285
                  L. Moreno and   
              R. M. Aguilar and   
               C. A. Martin and   
       J. D. Piñeiro and   
       J. I. Estévez and   
       J. L. Sánchez and   
                J. F. Sigut and   
           V. I. Jiménez   Patient-centered computer simulation in
                                  hospital management  . . . . . . . . . . 287--310


Journal of Network and Computer Applications
Volume 22, Number 1, January, 1999

              Wei-Chou Chen and   
             Tzung-Pei Hong and   
                      Rong Jeng   A framework of decision support systems
                                  for use on the World Wide Web  . . . . . 1--17
                Denis Helic and   
             Hermann Maurer and   
                Nick Scherbakov   Introducing hypermedia composites to WWW 19--32
              Hamesh Chawla and   
               Geoff Dillon and   
               Riccardo Bettati   HYDRANET: Network support for scaling of
                                  large-scale services . . . . . . . . . . 33--50
              Joachim Hasebrook   Web-based training, performance and
                                  controlling  . . . . . . . . . . . . . . 51--64
              Claude Ghaoui and   
                   M. J. Taylor   Special issue on: `Support for Open and
                                  Distance Learning on the WWW'  . . . . . 65--68

Journal of Network and Computer Applications
Volume 22, Number 2, April, 1999

              Harri Klapuri and   
               Jarmo Takala and   
                 Jukka Saarinen   Safety, liveness and real-time in
                                  embedded system design . . . . . . . . . 69--89
                   M. Kumar and   
               S. Venkatesh and   
                  K.-Y. Lim and   
                     H. Santoso   Information access and QoS issues in a
                                  mobile computing environment . . . . . . 91--118
                  K. Hanner and   
            R. Hörmanseder   Managing Windows NT$^\reg $ file system
                                  permissions --- a security tool to
                                  master the complexity of Microsoft
                                  Windows NT$^\reg $ file system
                                  permissions  . . . . . . . . . . . . . . 119--131
         Christine Steeples and   
                 Peter Goodyear   Enabling professional learning in
                                  distributed communities of practice:
                                  Descriptors for multimedia objects . . . 133--145
             Uffe Kock Wiil and   
        Kenneth M. Anderson and   
                 Michael Bieber   Call for Papers: Special Issue on:
                                  Hypermedia Extensibility Mechanisms and
                                  Scripting Languages  . . . . . . . . . . 147--148

Journal of Network and Computer Applications
Volume 22, Number 3, July, 1999

              J. E. Gilbert and   
                      C. Y. Han   Adapting instruction in search of `a
                                  significant difference'  . . . . . . . . 149--160
            Brian M. Slator and   
                 Paul Juell and   
          Philip E. McClean and   
    Bernhardt Saini-Eidukat and   
          Donald P. Schwert and   
              Alan R. White and   
                      Curt Hill   Virtual environments for education . . . 161--174
                      Guojun Lu   Design issues of multimedia information
                                  indexing and retrieval systems . . . . . 175--198
                Gail J. Ahn and   
                    Ravi Sandhu   Towards role-based administration in
                                  network information services . . . . . . 199--213

Journal of Network and Computer Applications
Volume 22, Number 4, October, 1999

                      Anonymous   Index and Contents to Volume 22  . . . . i--viii
                  Hongbo Du and   
                   Laurent Wery   Micro: a normalization tool for
                                  relational database designers  . . . . . 215--232
             David Mioduser and   
              Rafi Nachmias and   
               Avigail Oren and   
                     Orly Lahav   Web-based learning environments (WBLE):
                                  Current implementation and evolving
                                  trends . . . . . . . . . . . . . . . . . 233--247
    Rosa María Carro and   
            Estrella Pulido and   
         Pilar Rodríguez   Dynamic generation of adaptive
                                  Internet-based courses . . . . . . . . . 249--257
                    Luca Iocchi   The Web-OEM approach to Web information
                                  extraction . . . . . . . . . . . . . . . 259--269


Journal of Network and Computer Applications
Volume 23, Number 1, January, 2000

            Wolfgang Hürst   User interfaces for telepresentations
                                  --- Input devices, interaction concepts
                                  and design issues  . . . . . . . . . . . 1--15
                Wim de Boer and   
                   Betty Collis   Instructors' choices for a WWW-based
                                  course-support environment . . . . . . . 17--26
                 Chih-Hsiung Tu   On-line learning migration: from social
                                  learning theory to social presence
                                  theory in a CMC environment  . . . . . . 27--37
                 Chih-Hsiung Tu   Critical examination of factors
                                  affecting interaction on CMC . . . . . . 39--58

Journal of Network and Computer Applications
Volume 23, Number 2, April, 2000

             Chwei-King Mok and   
                   Nader F. Mir   An efficient interconnection network for
                                  large-scale computer communications
                                  applications . . . . . . . . . . . . . . 59--75
                Dave Berque and   
           Andrew Hutcheson and   
           David K. Johnson and   
            Larry Jovanovic and   
                 Kyle Moore and   
                Carl Singer and   
              Kevin M. Slattery   The design of an interface for student
                                  note annotation in a networked
                                  electronic classroom . . . . . . . . . . 77--91
                Colin Pattinson   A simulated network management
                                  information base . . . . . . . . . . . . 93--107
             Gerhard Eschelbeck   Active Security --- a proactive approach
                                  for computer security systems  . . . . . 109--130
                   Jon Dron and   
           Richard Mitchell and   
               Phil Siviter and   
                    Chris Boyne   CoFIND --- an experiment in
                                  $N$-dimensional collaborative filtering  131--142
                Bu-Sung Lee and   
             Chiew-Tong Lau and   
             Nicholas C. H. Vun   Power LAN MIB for management of
                                  intelligent telecommunication equipment  143--154

Journal of Network and Computer Applications
Volume 23, Number 3, July, 2000

                      Anonymous   Preface by the Editor in Chief . . . . . 155
            Bert J. Dempsey and   
                     Micah Beck   Preface to `Developing New Network-based
                                  Storage Services for Internet-supported
                                  Collaborative Communities' . . . . . . . 157--159
                     Ivan Tomek   Preface to `Virtual Environments'  . . . 161--162
        John Chung-I Chuang and   
                Marvin A. Sirbu   Distributed network storage service with
                                  quality-of-service guarantees  . . . . . 163--185
              Ann Chervenak and   
                 Ian Foster and   
             Carl Kesselman and   
          Charles Salisbury and   
                  Steven Tuecke   The data grid: Towards an architecture
                                  for the distributed management and
                                  analysis of large scientific datasets    187--200
                Bert J. Dempsey   Performance analysis of a scaleable
                                  design for replicating file collections
                                  in wide-area networks  . . . . . . . . . 201--218
            Laura Slaughter and   
           Gary Marchionini and   
                   Gary Geisler   Open video: a framework for a test
                                  collection . . . . . . . . . . . . . . . 219--245
                 Anna Cicognani   Language and design in text-based
                                  virtual worlds . . . . . . . . . . . . . 247--274
                     Ivan Tomek   The design and implementation of a MOO   275--289
         Alicia Díaz and   
     Alejandro Fernández   A pattern language for virtual
                                  environments . . . . . . . . . . . . . . 291--309
            Zi\`ed Choukair and   
              Damien Retailleau   A QoS model for collaboration through
                                  Distributed Virtual Environments . . . . 311--334

Journal of Network and Computer Applications
Volume 23, Number 4, October, 2000

                      Anonymous   Index and contents to volume 23  . . . . iii--viii
                      H. Maurer   Preface for the special issue `Support
                                  for flexible e-Learning on the WWW'  . . 335
              Claude Ghaoui and   
                   M. J. Taylor   Support for flexible e-Learning on the
                                  WWW: a special issue . . . . . . . . . . 337--338
                   O. Brand and   
                  L. Petrak and   
            D. Sturzebecher and   
                  M. Zitterbart   Supporting Tele-Teaching: visualization
                                  aspects  . . . . . . . . . . . . . . . . 339--355
               Weigang Wang and   
         Jörg M. Haake and   
             Jessica Rubart and   
               Daniel A. Tietze   Hypermedia-based support for cooperative
                                  learning of process knowledge  . . . . . 357--379
             Samuli Pekkola and   
              Mike Robinson and   
             Jonni Korhonen and   
                Saku Hujala and   
                  Tero Toivonen   Multimedia application to support
                                  distance learning and other social
                                  interactions in real-time  . . . . . . . 381--399
          Hans-Peter Dommel and   
       J. J. Garcia-Luna-Aceves   A coordination framework and
                                  architecture for Internet groupware  . . 401--427
       Stuart K. MacGlashan and   
              Malcolm J. Taylor   MUSiCAL: an object-oriented hypermedia
                                  data model for the reuse of museum
                                  information for computer-aided learning
                                  and the World-Wide Web . . . . . . . . . 429--453
                  Claude Ghaoui   Document icon bar for the support of
                                  authoring, learning and navigation on
                                  the Web: Usability issues  . . . . . . . 455--475


Journal of Network and Computer Applications
Volume 24, Number 1, January, 2001

             Uffe Kock Wiil and   
            Kenneth M. Anderson   Preface to `Hypermedia extensibility
                                  mechanisms and scripting languages'  . . 1--5
                 Uffe Kock Wiil   A framework for classifying
                                  extensibility mechanisms in hypermedia
                                  systems  . . . . . . . . . . . . . . . . 7--18
         Peter J. Nürnberg   Extensibility in component-based open
                                  hypermedia systems . . . . . . . . . . . 19--38
                  John Noll and   
                   Walt Scacchi   Specifying process-oriented hypertext
                                  for organizational computing . . . . . . 39--61
                  Serge Demeyer   Extensibility via a meta-level
                                  architecture . . . . . . . . . . . . . . 63--74
            Kenneth M. Anderson   The extensibility mechanisms of the
                                  Chimera open hypermedia system . . . . . 75--86

Journal of Network and Computer Applications
Volume 24, Number 2, April, 2001

              Gail-Joon Ahn and   
                    Kwangjo Kim   CONUGA: Constrained User-Group
                                  Assignment . . . . . . . . . . . . . . . 87--100
              Harri Klapuri and   
               Jarmo Takala and   
                 Jukka Saarinen   Implementing reactive closed-system
                                  specifications . . . . . . . . . . . . . 101--123
                   Guoyi Li and   
            Ian Li-Jin Thng and   
       Lawrence Wai Choong Wong   ABR services for overcoming misbehaving
                                  sources in a heterogeneous environment   125--149
          David Hua Min Tan and   
             Siu Cheung Hui and   
                 Chiew Tong Lau   Wireless messaging services for mobile
                                  users  . . . . . . . . . . . . . . . . . 151--166
              Igor Djurovic and   
           Srdjan Stankovic and   
                  Ioannis Pitas   Digital watermarking in the fractional
                                  Fourier transformation domain  . . . . . 167--173

Journal of Network and Computer Applications
Volume 24, Number 3, July, 2001

                  C. Bouras and   
             A. Philopoulos and   
                   Th. Tsiatsos   e-Learning through distributed virtual
                                  environments . . . . . . . . . . . . . . 175--199
               Duen-Ren Liu and   
               Yuh-Jaan Lin and   
             Chung-Min Chen and   
                   Ya-Wen Huang   Deployment of personalized e-catalogues:
                                  an agent-based framework integrated with
                                  XML metadata and user models . . . . . . 201--228
                 W. F. Poon and   
                       K. T. Lo   Design of a starvation-free storage
                                  system for a multicast video-on-demand
                                  system using a double-rate batching
                                  policy . . . . . . . . . . . . . . . . . 229--247
            Ming-Chung Tang and   
              Chun-Nun Chou and   
             Ching-Hui Tang and   
                  D. C. Pan and   
                  Wei-Kuan Shih   Exploiting GSM short message service for
                                  ubiquitous accessing . . . . . . . . . . 249--267
             Uffe Kock Wiil and   
             David L. Hicks and   
         Peter J. Nürnberg   Special Issue on `Structural Computing'  269--271

Journal of Network and Computer Applications
Volume 24, Number 4, October, 2001

                      Anonymous   Volume Contents  . . . . . . . . . . . . i--viii
               J. A. Lennon and   
                      H. Maurer   MUSLI: a hypermedia interface for
                                  dynamic, interactive, and symbolic
                                  communication  . . . . . . . . . . . . . 273--291
               J. A. Lennon and   
                      H. Maurer   Augmenting text and voice conversations
                                  with dynamic, interactive abstractions
                                  using P2P networking . . . . . . . . . . 293--306
                Nawel Sabri and   
                Chantal Taconet   A generic tool to federate WAN servers   307--331
          Rached N. Zantout and   
              Ahmed A. Guessoum   An automatic English--Arabic HTML page
                                  translation system . . . . . . . . . . . 333--357


Journal of Network and Computer Applications
Volume 25, Number 1, January, 2002

               P. C. Saxena and   
            D. R. Choudhury and   
                 G. Gabrani and   
                   S. Gupta and   
                M. Bhardwaj and   
                      M. Chopra   A heuristic approach to resource
                                  locations in broadband networks  . . . . 1--35
                 M. Kouadio and   
                       U. Pooch   Technology on social issues of
                                  videoconferencing on the Internet: a
                                  survey . . . . . . . . . . . . . . . . . 37--56
             Yoon-Jung Rhee and   
               Eun-Sil Hyun and   
                    Tai-Yun Kim   Connection management for QoS service on
                                  the Web  . . . . . . . . . . . . . . . . 57--68

Journal of Network and Computer Applications
Volume 25, Number 2, April, 2002

                Heejin Jang and   
                   Sangwook Kim   Intruder tracing through dynamic
                                  extension of a security domain . . . . . 69--91
                 Chun-I Fan and   
                 Chin-Laung Lei   An unlinkably divisible and intention
                                  attachable ticket scheme for runoff
                                  elections  . . . . . . . . . . . . . . . 93--107
            Waleed E. Farag and   
            Hussein Abdel-Wahab   A new paradigm for analysis of MPEG
                                  compressed videos  . . . . . . . . . . . 109--127
                  T. Morris and   
               P. Blenkhorn and   
                   Farhan Zaidi   Blink detection for real-time eye
                                  tracking . . . . . . . . . . . . . . . . 129--143
                Bu-Sung Lee and   
              Chai-Kiat Yeo and   
                      Ruijin Fu   Hybrid quality adaptation mechanism for
                                  layered multicast over the Internet  . . 145--159

Journal of Network and Computer Applications
Volume 25, Number 3, July, 2002

            Chih-Yung Chang and   
                   Shin-Chih Tu   Active route-maintenance protocol for
                                  signal-based communication path in ad
                                  hoc networks . . . . . . . . . . . . . . 161--177
         Nischal M. Piratla and   
            Anura P. Jayasumana   A neural network based real-time gaze
                                  tracker  . . . . . . . . . . . . . . . . 179--196
                Anita Behle and   
           Michael Kirchhof and   
               Manfred Nagl and   
                    Ralf Welter   Retrieval of software components using a
                                  distributed web system . . . . . . . . . 197--222
    Rudolf Hörmanseder and   
             Johann Murauer and   
   Jörg R. Mühlbacher   Managing data flow in a DAC supporting
                                  security system  . . . . . . . . . . . . 223--238

Journal of Network and Computer Applications
Volume 25, Number 4, October, 2002

                Fawzi Daoud and   
                Takahiko Nomura   Preface to `smart spaces'  . . . . . . . 239--242
            Daphne Economou and   
        William L. Mitchell and   
              Steve R. Pettifer   Problem driven CVE technology
                                  development  . . . . . . . . . . . . . . 243--262
                Takahiko Nomura   Design of `Ba' for successful Knowledge
                                  Management --- how enterprises should
                                  design the places of interaction to gain
                                  competitive advantage  . . . . . . . . . 263--278
           Masakatsu Kosuga and   
             Naoki Kirimoto and   
           Tatsuya Yamazaki and   
         Tomonori Nakanishi and   
          Masakazu Masuzaki and   
                  Kazuo Hasuike   A multimedia service composition scheme
                                  for ubiquitous networks  . . . . . . . . 279--293
          Christopher Maher and   
                Margaret Corbit   Creating genetic applications for
                                  informal science learning in multi-user
                                  virtual environments . . . . . . . . . . 295--308
               Tatsuya Yamazaki   QoS-based media retrieval for networked
                                  digital archives . . . . . . . . . . . . 309--317
  Stéphane Lo Presti and   
                Didier Bert and   
                   Andrzej Duda   TAO: Temporal Algebraic Operators for
                                  modeling multimedia presentations  . . . 319--342


Journal of Network and Computer Applications
Volume 26, Number 1, January, 2003

             Hilde van der Togt   Publisher's Note . . . . . . . . . . . . 1--2
               Uffe K. Wiil and   
     Peter J. Nürnberg and   
                 David L. Hicks   Structural computing: research
                                  directions, systems and issues . . . . . 3--9
     Peter J. Nürnberg and   
         Monica M. C. Schraefel   Relationships among structural computing
                                  and other fields . . . . . . . . . . . . 11--26
             David L. Hicks and   
                   Uffe K. Wiil   Searching for revolution in structural
                                  computing  . . . . . . . . . . . . . . . 27--45
        Kenneth M. Anderson and   
          Susanne A. Sherba and   
           William Van Lepthien   Structural templates and
                                  transformations: the Themis structural
                                  computing environment  . . . . . . . . . 47--71
                   Weigang Wang   Visualizing and interacting with
                                  hypermedia-based process-centric
                                  enterprise models  . . . . . . . . . . . 73--93
               David E. Millard   Discussions at the data border: from
                                  generalised hypertext to structural
                                  computing  . . . . . . . . . . . . . . . 95--114
               Uffe K. Wiil and   
                 Samir Tata and   
                 David L. Hicks   Cooperation services in the Construct
                                  structural computing environment . . . . 115--137
         Manolis Tzagarakis and   
         Dimitris Avramidis and   
        Maria Kyriakopoulou and   
     Monica M. C. Schraefel and   
            Michalis Vaitis and   
       Dimitris Christodoulakis   Structuring primitives in the
                                  Callimachus component-based open
                                  hypermedia system  . . . . . . . . . . . 139--162
                      Anonymous   Calendar . . . . . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 26, Number 2, April 1, 2003

             B. Prabhakaran and   
                 Yuguang Tu and   
                         Yin Wu   Experiences with an object-level
                                  scalable web framework . . . . . . . . . 163--196
                 K. Komathy and   
            V. Ramachandran and   
                P. Vivekanandan   Security for XML messaging services ---
                                  a component-based approach . . . . . . . 197--211
               Gareth Evans and   
                 Paul Blenkhorn   Architectures of assistive software
                                  applications for Windows-based computers 213--228

Journal of Network and Computer Applications
Volume 26, Number 3, 2003

                    M. Zaki and   
              M. G. Darwish and   
                       G. Osman   GBF: a grammar based filter for Internet
                                  applications . . . . . . . . . . . . . . 229--257
         Nikitas M. Sgouros and   
          Stelios Gerogiannakis   Robot teleoperation environments
                                  featuring WAP-based wireless devices . . 259--271
                  C. K. Yeo and   
                  B. S. Lee and   
                       M. H. Er   A framework for multicast video
                                  streaming over IP networks . . . . . . . 273--289

Journal of Network and Computer Applications
Volume 26, Number 4, November, 2003

                      Anonymous   Index to volume 26 . . . . . . . . . . . III--IV
           Ching-Lung Chang and   
                  Kuo-Sheng Hsu   Design and implementation of MP3-music
                                  on demand system using streaming
                                  technology . . . . . . . . . . . . . . . 291--321
                 Li Chunlin and   
                      Li Layuan   Apply agent to build grid service
                                  management . . . . . . . . . . . . . . . 323--340


Journal of Network and Computer Applications
Volume 27, Number 1, January, 2004

              Jasmine Banks and   
         Geoffery Ericksson and   
              Kevin Burrage and   
           Peter Yellowlees and   
               Sean Ivermee and   
                Jennifer Tichon   Constructing the hallucinations of
                                  psychosis in Virtual Reality . . . . . . 1--11
               Wassim Itani and   
                   Ayman Kayssi   J2ME application-layer end-to-end
                                  security for m-commerce  . . . . . . . . 13--32
               Duen-Ren Liu and   
                Tzyy-Feng Hwang   An agent-based approach to flexible
                                  commerce in intermediary-centric
                                  electronic markets . . . . . . . . . . . 33--48
               Asrar Sheikh and   
                    Tao Wan and   
                 Zaki Alakhdhar   A unified approach to analyze multiple
                                  access protocols for buffered finite
                                  users  . . . . . . . . . . . . . . . . . 49--76

Journal of Network and Computer Applications
Volume 27, Number 2, April, 2004

                  Heng Wang and   
                   Jie Fang and   
                   Hua Wang and   
                     Ya-Min Sun   TSDLMRA: an efficient multicast routing
                                  algorithm based on Tabu search . . . . . 77--90
                  C. Bouras and   
                   Th. Tsiatsos   Distributed virtual reality: building a
                                  multi-user layer for the EVE Platform    91--111
                G. A. Aderounmu   Performance comparison of remote
                                  procedure calling and mobile agent
                                  approach to control and data transfer in
                                  distributed computing environment  . . . 113--129

Journal of Network and Computer Applications
Volume 27, Number 3, August, 2004

            A. U. H. Sheikh and   
                     T. Wan and   
            S. Z. Alakhdhar and   
              I. Lambadaris and   
               M. Devetsikiotis   Performance analysis of buffered R-ALOHA
                                  systems using tagged user approach . . . 131--150
                   Wen-Lin Yang   A comparison of two optimal approaches
                                  for the MCOP problem . . . . . . . . . . 151--162
                Denis Helic and   
             Hermann Maurer and   
                 Nick Scerbakov   Knowledge transfer processes in a modern
                                  WBT system . . . . . . . . . . . . . . . 163--190

Journal of Network and Computer Applications
Volume 27, Number 4, November, 2004

                      Anonymous   Index  . . . . . . . . . . . . . . . . . III--IV
                Wei-Bin Lee and   
                Kuan-Chieh Liao   Constructing identity-based
                                  cryptosystems for discrete logarithm
                                  based cryptosystems  . . . . . . . . . . 191--199
                    M. Zaki and   
                  Tarek S. Sobh   A cooperative agent-based model for
                                  active security systems  . . . . . . . . 201--220
         Sergio A. Velastin and   
                   Benny Lo and   
                        Jie Sun   A flexible communications protocol for a
                                  distributed surveillance system  . . . . 221--253


Journal of Network and Computer Applications
Volume 28, Number 1, January, 2005

                     Tao Gu and   
             Hung Keng Pung and   
                  Da Qing Zhang   A service-oriented middleware for
                                  building context-aware services  . . . . 1--18
                   M. Khedr and   
                    A. Karmouch   ACAI: agent-based context-aware
                                  infrastructure for spontaneous
                                  applications . . . . . . . . . . . . . . 19--44
                  Ismail Erturk   A new method for transferring CAN
                                  messages using wireless ATM  . . . . . . 45--56
                Huamin Chen and   
              Prasant Mohapatra   Using service brokers for accessing
                                  backend servers for web applications . . 57--74

Journal of Network and Computer Applications
Volume 28, Number 2, April, 2005

                      Anonymous   Announcement . . . . . . . . . . . . . . I
                      Anonymous   Announcement . . . . . . . . . . . . . . II
                      Anonymous   Preface  . . . . . . . . . . . . . . . . 75--76
             Reginald L. Walker   Hierarchical task topology for
                                  retrieving information from within a
                                  simulated information ecosystem  . . . . 77--96
              A. Rungsawang and   
             N. Angkawattanawit   Learnable topic-specific web crawler . . 97--114
            Wataru Sunayama and   
               Masahiko Yachida   Panoramic View System for extracting key
                                  sentences based on viewpoints and
                                  application to a search engine . . . . . 115--127
              Mark P. Sinka and   
                 David W. Corne   The BankSearch web document dataset:
                                  investigating unsupervised clustering
                                  and category similarity  . . . . . . . . 129--146
               Xiaozhe Wang and   
              Ajith Abraham and   
                  Kate A. Smith   Intelligent web traffic mining and
                                  analysis . . . . . . . . . . . . . . . . 147--165
         Srinivas Mukkamala and   
             Andrew H. Sung and   
                  Ajith Abraham   Intrusion detection using an ensemble of
                                  intelligent paradigms  . . . . . . . . . 167--182

Journal of Network and Computer Applications
Volume 28, Number 3, August, 2005

           Elhadi Shakshuki and   
               Zhonghai Luo and   
                      Jing Gong   An agent-based approach to security
                                  service  . . . . . . . . . . . . . . . . 183--208
                 Ch. Bouras and   
                  A. Gkamas and   
                    I. Nave and   
                 D. Primpas and   
                   A. Shani and   
                  O. Sheory and   
                  K. Stamos and   
                      Y. Tzruya   Application on demand system over the
                                  Internet . . . . . . . . . . . . . . . . 209--232
                     Tao Gu and   
             Hung Keng Pung and   
                  Jian Kang Yao   Towards a flexible service discovery . . 233--248

Journal of Network and Computer Applications
Volume 28, Number 4, November, 2005

                      Anonymous   Index to Volume 28 . . . . . . . . . . . III--IV
                D. Di Sorte and   
                       G. Reali   Pricing and brokering services over
                                  interconnected IP networks . . . . . . . 249--283
            Christos Bouras and   
               Afrodite Sevasti   Service level agreements for
                                  DiffServ-based services' provisioning    285--302


Journal of Network and Computer Applications
Volume 29, Number 1, January, 2006

              Bing-Yi Zhang and   
                     Ya-Min Sun   Fractional alpha stable network traffic
                                  model and its application in QoS routing 1--10
      Elizabeth A. Thompson and   
              Eric Harmison and   
              Robert Carper and   
              Robert Martin and   
                     Jim Isaacs   Robot teleoperation featuring
                                  commercially available wireless network
                                  cards  . . . . . . . . . . . . . . . . . 11--24
   Leonardo Bidese de Pinho and   
         Claudio Luis de Amorim   Assessing the efficiency of stream reuse
                                  techniques in P2P video-on-demand
                                  systems  . . . . . . . . . . . . . . . . 25--45
                   N. Zhang and   
                     Q. Shi and   
                 M. Merabti and   
                     R. Askwith   Practical and efficient fair document
                                  exchange over networks . . . . . . . . . 46--61
                  T. Morris and   
                     V. Chauhan   Facial feature tracking for cursor
                                  control  . . . . . . . . . . . . . . . . 62--80
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 29, Number 2--3, August / April, 2005/2006

            Nikhil Ichalkaranje   Editorial  . . . . . . . . . . . . . . . 81--82
           Yukiko I. Nakano and   
         Toshihiro Murayama and   
            Masashi Okamoto and   
           Daisuke Kawahara and   
                    Qing Li and   
            Sadao Kurohashi and   
                Toyoaki Nishida   Cards-to-presentation on the web:
                                  generating multimedia contents featuring
                                  agent animations . . . . . . . . . . . . 83--104
             Pierre Urlings and   
           Christos Sioutis and   
              Jeff Tweedale and   
        Nikhil Ichalkaranje and   
                    Lakhmi Jain   A future framework for interfacing BDI
                                  agents in a real-time teaming
                                  environment  . . . . . . . . . . . . . . 105--123
        E. V. Krishnamurthy and   
                   V. K. Murthy   Distributed agent paradigm for soft and
                                  hard computation . . . . . . . . . . . . 124--146
                 Colin Fyfe and   
                    Lakhmi Jain   Teams of intelligent agents which learn
                                  using artificial immune systems  . . . . 147--159
                  J. Jarvis and   
          R. Rönnquist and   
               D. McFarlane and   
                        L. Jain   A team-based holonic approach to robotic
                                  assembly cell control  . . . . . . . . . 160--176
     Anders I. Mòrch and   
             Jan A. Dolonen and   
      Jan Eirik B. Nævdal   An evolutionary approach to prototyping
                                  pedagogical agents: from simulation to
                                  integrated system  . . . . . . . . . . . 177--199
                    Weiqin Chen   Supporting teachers' intervention in
                                  collaborative knowledge building . . . . 200--215
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 29, Number 4, November, 2006

             A. A. Akintola and   
            G. A. Aderounmu and   
                   M. O. Adigun   Performance analysis of double buffer
                                  technique (DBT) model for mobility
                                  support in wireless IP networks  . . . . 217--234
                Shih-Lin Wu and   
              Sui Fan-Jiang and   
                   Zi-Tsan Chou   An efficient quality-of-service MAC
                                  protocol for infrastructure WLANs  . . . 235--261
              Hea-Sook Park and   
                  Doo-Kwon Baik   A study for control of client value
                                  using cluster analysis . . . . . . . . . 262--276
                  Susanne Loidl   Towards pervasive learning:
                                  WeLearn.Mobile. A CPS package viewer for
                                  handhelds  . . . . . . . . . . . . . . . 277--293
                   Peng Liu and   
                   Hai Wang and   
                     Lunquan Li   Real-time data attack isolation for
                                  commercial database applications . . . . 294--320
           Crescencio Bravo and   
   Miguel Á. Redondo and   
              Manuel Ortega and   
              M. Felisa Verdejo   Collaborative distributed environments
                                  for learning design tasks by means of
                                  modelling and simulation . . . . . . . . 321--342
                M. Avvenuti and   
                     A. Vecchio   Application-level network emulation: the
                                  EmuSocket toolkit  . . . . . . . . . . . 343--360
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2


Journal of Network and Computer Applications
Volume 30, Number 1, January, 2007

              Ajith Abraham and   
                 Kate Smith and   
                  Ravi Jain and   
                    Lakhmi Jain   Network and information security: a
                                  computational intelligence approach:
                                  Special Issue of Journal of Network and
                                  Computer Applications  . . . . . . . . . 1--3
            Feng-Hsing Wang and   
             Lakhmi C. Jain and   
                Jeng-Shyang Pan   VQ-based watermarking scheme with
                                  genetic codebook partition . . . . . . . 4--23
                Tai-Wen Yue and   
                  Suchen Chiang   The semipublic encryption for visual
                                  cryptography using Q'tron neural
                                  networks . . . . . . . . . . . . . . . . 24--41
              Gail-Joon Ahn and   
            Badrinath Mohan and   
                 Seng-Phil Hong   Towards secure information sharing using
                                  role-based delegation  . . . . . . . . . 42--59
                 Yihua Liao and   
              V. Rao Vemuri and   
                Alejandro Pasos   Adaptive anomaly detection with evolving
                                  connectionist systems  . . . . . . . . . 60--80
              Ajith Abraham and   
                  Ravi Jain and   
             Johnson Thomas and   
                  Sang Yong Han   D-SCIDS: Distributed soft computing
                                  intrusion detection system . . . . . . . 81--98
          Tansel Özyer and   
                Reda Alhajj and   
                     Ken Barker   Intrusion detection by integrating
                                  boosting genetic fuzzy classifier and
                                  data mining criteria for rule
                                  pre-screening  . . . . . . . . . . . . . 99--113
     Sandhya Peddabachigari and   
              Ajith Abraham and   
               Crina Grosan and   
                 Johnson Thomas   Modeling intrusion detection system
                                  using hybrid intelligent systems . . . . 114--132
                  Ali El Kateeb   High-speed routers design using data
                                  stream distributor unit  . . . . . . . . 133--144
              Chen Hongsong and   
                Ji Zhenzhou and   
                Hu Mingzeng and   
              Fu Zhongchuan and   
                 Jiang Ruixiang   Design and performance evaluation of a
                                  multi-agent-based dynamic lifetime
                                  security scheme for AODV routing
                                  protocol . . . . . . . . . . . . . . . . 145--166
          Khong Neng Choong and   
                  B. M. Ali and   
                 V. Prakash and   
                  Yoke Chek Yee   The case for a dynamic proxy framework
                                  with voluntary/incentive-based client
                                  hosting scheme . . . . . . . . . . . . . 167--185
           Hojjat Jafarpour and   
             Nasser Yazdani and   
             Navid Bazzaz-zadeh   A scalable group communication mechanism
                                  for mobile agents  . . . . . . . . . . . 186--208
              V. Kalogeraki and   
       D. Zeinalipour-Yazti and   
               D. Gunopulos and   
                       A. Delis   Distributed middleware architectures for
                                  scalable media services  . . . . . . . . 209--243
                 Tainchi Lu and   
                   Chinghao Hsu   Mobile agents for information retrieval
                                  in hybrid simulation environment . . . . 244--264
                    Hui Guo and   
                Guobin Shen and   
              Zhiguang Wang and   
                     Shipeng Li   Optimized streaming media proxy and its
                                  applications . . . . . . . . . . . . . . 265--281
                    Lei Guo and   
                Hongfang Yu and   
                       Lemin Li   Dynamic survivable algorithm for meshed
                                  WDM optical networks . . . . . . . . . . 282--295
             Jenq-Shiou Leu and   
                Yuan-Po Chi and   
                  Wei-Kuan Shih   Design and implementation of Blog
                                  Rendering and Accessing INstantly system
                                  (BRAINS) . . . . . . . . . . . . . . . . 296--307
                 Lijun Qian and   
                  Ning Song and   
                   Xiangfang Li   Detection of wormhole attacks in
                                  multi-path routed wireless ad hoc
                                  networks: a statistical analysis
                                  approach . . . . . . . . . . . . . . . . 308--330
             Kwang Sik Shin and   
                Jin Ha Jung and   
            Jin Young Cheon and   
                 Sang Bang Choi   Real-time network monitoring scheme
                                  based on SNMP for dynamic information    331--353
                Xiaobo Zhou and   
                Jianbin Wei and   
                 Cheng-Zhong Xu   Quality-of-service differentiation on
                                  the Internet: a taxonomy . . . . . . . . 354--383
                 Suneuy Kim and   
                   Chita R. Das   An analytical model for interval caching
                                  in interactive video servers . . . . . . 384--413
           M. Saniee Abadeh and   
                  J. Habibi and   
                       C. Lucas   Intrusion detection using a fuzzy
                                  genetics-based learning algorithm  . . . 414--428
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 30, Number 2, April, 2007

                  Rongxi He and   
                    Bin Lin and   
                       Lemin Li   Dynamic service-level-agreement aware
                                  shared-path protection in WDM mesh
                                  networks . . . . . . . . . . . . . . . . 429--444
                 B. Stephen and   
               L. Petropoulakis   The design and implementation of an
                                  agent-based framework for acceptable
                                  usage policy monitoring and enforcement  445--465
                 Wang Liang and   
                Guo Yi-Ping and   
                      Fang Ming   Web search engine based on DNS . . . . . 466--478
                  M. Esteve and   
                C. E. Palau and   
 J. Martínez-Nohales and   
                      B. Molina   A video streaming application for urban
                                  traffic management . . . . . . . . . . . 479--498
            M. Can Filibeli and   
              Oznur Ozkasap and   
               M. Reha Civanlar   Embedded web server-based home appliance
                                  networks . . . . . . . . . . . . . . . . 499--514
                Xiaobo Zhou and   
                 Cheng-Zhong Xu   Efficient algorithms of video
                                  replication and placement on a cluster
                                  of streaming servers . . . . . . . . . . 515--540
              Kenneth J. Turner   Representing and analysing composed web
                                  services using \sc Cress . . . . . . . . 541--562
            Bouras Christos and   
           Kounenis Giorgos and   
              Misedakis Ioannis   A web content manipulation technique
                                  based on page Fragmentation  . . . . . . 563--585
          Siti Z. Z. Abidin and   
                   Min Chen and   
                  Phil W. Grant   Designing interaction protocols using
                                  noughts and crosses type games . . . . . 586--613
         Alejandro Quintero and   
                   Da Yu Li and   
                  Harold Castro   A location routing protocol based on
                                  smart antennas for ad hoc networks . . . 614--636
                     Y. Bai and   
                      M. R. Ito   A new technique for minimizing network
                                  loss from users' perspective . . . . . . 637--649
                    Lei Guo and   
                    Jin Cao and   
                Hongfang Yu and   
                       Lemin Li   A new shared-risk link groups
                                  (SRLG)-disjoint path provisioning with
                                  shared protection in WDM optical
                                  networks . . . . . . . . . . . . . . . . 650--661
            Chin-Chen Chang and   
              Chih-Yang Lin and   
                   Keng-Chu Lin   Simple efficient mutual anonymity
                                  protocols for peer-to-peer network based
                                  on primitive roots . . . . . . . . . . . 662--676
                    Jin Cao and   
                    Lei Guo and   
                Hongfang Yu and   
                       Lemin Li   A novel recursive shared segment
                                  protection algorithm in survivable WDM
                                  networks . . . . . . . . . . . . . . . . 677--694
               Rongping Lin and   
                 Sheng Wang and   
                       Lemin Li   Protections for multicast session in WDM
                                  optical networks under reliability
                                  constraints  . . . . . . . . . . . . . . 695--705
                Chan-Ho Min and   
                      Sehun Kim   On-demand utility-based power control
                                  routing for energy-aware optimization in
                                  mobile ad hoc networks . . . . . . . . . 706--727
                Gwo-Jong Yu and   
            Chih-Yung Chang and   
             Kuei-Ping Shih and   
                 Shih-Chieh Lee   Relay reduction and disjoint routes
                                  construction for scatternet over
                                  Bluetooth radio system . . . . . . . . . 728--749
             Kwang-Sik Shin and   
                Jin-Ha Jung and   
                Wan-Oh Yoon and   
                 Sang-Bang Choi   P2P transfer of partial stream in
                                  multimedia multicast . . . . . . . . . . 750--774
                   Yiqun Xu and   
             Luigi Logrippo and   
              Jacques Sincennes   Detecting feature interactions in CPL    775--799
Ibrahim Özçelik and   
              Hüseyin Ekiz   Building an interconnection between
                                  PROFIBUS and ATM networks  . . . . . . . 800--817
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 30, Number 3, August, 2007

                Xiaobo Zhou and   
                 Cheng-Zhong Xu   Distributed denial-of-service and
                                  intrusion detection  . . . . . . . . . . 819--822
               Shigang Chen and   
                  Yong Tang and   
                    Wenliang Du   Stateful DDoS attacks and targeted
                                  filtering  . . . . . . . . . . . . . . . 823--840
          Matthias Bossardt and   
    Thomas Dübendorfer and   
              Bernhard Plattner   Enhanced Internet security by a
                                  distributed traffic control service
                                  based on traffic ownership . . . . . . . 841--857
          Vasilios A. Siris and   
                Ilias Stavrakis   Provider-based deterministic packet
                                  marking against distributed DoS attacks  858--876
                   Tao Peng and   
         Christopher Leckie and   
         Kotagiri Ramamohanarao   Information sharing for distributed
                                  intrusion detection systems  . . . . . . 877--899
       Gabriel López and   
       Oscar Cánovas and   
    Antonio F. Gómez and   
Jesús D. Jiménez and   
            Rafael Marín   A network access control approach based
                                  on the AAA architecture and
                                  authorization attributes . . . . . . . . 900--919
                   Celia Li and   
               Cungang Yang and   
                 Richard Cheung   Key management for role hierarchy in
                                  distributed systems  . . . . . . . . . . 920--936
                    Bing Wu and   
                     Jie Wu and   
       Eduardo B. Fernandez and   
             Mohammad Ilyas and   
              Spyros Magliveras   Secure and efficient key management in
                                  mobile ad hoc networks . . . . . . . . . 937--954
         George D. Magoulas and   
                  George Ghinea   Intelligence-based adaptation for
                                  ubiquitous multimedia communications . . 955--957
            Dietmar Jannach and   
                  Klaus Leopold   Knowledge-based multimedia adaptation
                                  for ubiquitous multimedia consumption    958--982
             Nicola Cranley and   
               Philip Perry and   
                    Liam Murphy   Dynamic content-based adaptation of
                                  streamed multimedia  . . . . . . . . . . 983--1006
              M. J. O'Grady and   
            G. M. P. O'Hare and   
                    C. Donaghey   Delivering adaptivity through
                                  context-awareness  . . . . . . . . . . . 1007--1033
         Vincent Charvillat and   
               Romulus Grigoras   Reinforcement learning for dynamic
                                  multimedia adaptation  . . . . . . . . . 1034--1058
               Johan Bollen and   
          Michael L. Nelson and   
               Gary Geisler and   
                  Raquel Araujo   Usage derived recommendations for a
                                  video digital library  . . . . . . . . . 1059--1083
       Gloria Phillips-Wren and   
               Anders Morch and   
              Jeff Tweedale and   
            Nikhil Ichalkaranje   Innovations in agent collaboration,
                                  cooperation and Teaming, Part 2  . . . . 1085--1088
                J. Tweedale and   
            N. Ichalkaranje and   
                 C. Sioutis and   
                  B. Jarvis and   
                 A. Consoli and   
               G. Phillips-Wren   Innovations in multi-agent systems . . . 1089--1115
                Lin Padgham and   
                        Wei Liu   Internet collaboration and service
                                  composition as a loose form of teamwork  1116--1135
       Antonella Di Stefano and   
        Giuseppe Pappalardo and   
            Corrado Santoro and   
            Emiliano Tramontana   A framework for the design and automated
                                  implementation of communication aspects
                                  in multi-agent systems . . . . . . . . . 1136--1152
                     Wei Xu and   
               Jiannong Cao and   
                Beihong Jin and   
                    Jing Li and   
                    Liang Zhang   GCS-MA: a group communication system for
                                  mobile agents  . . . . . . . . . . . . . 1153--1172
                Tom Wanyama and   
           Behrouz Homayoun Far   A protocol for multi-agent negotiation
                                  in a group-choice decision making
                                  process  . . . . . . . . . . . . . . . . 1173--1195
         Gerhard Weiß and   
           Matthias Nickles and   
           Michael Rovatsos and   
                  Felix Fischer   Specifying the intertwining of
                                  cooperation and autonomy in agent-based
                                  systems  . . . . . . . . . . . . . . . . 1196--1215
                Justin Zhan and   
                Stan Matwin and   
                     LiWu Chang   Privacy-preserving collaborative
                                  association rule mining  . . . . . . . . 1216--1227
        Abdelhamid Ouardani and   
              Samuel Pierre and   
               Hanifa Boucheneb   A security protocol for mobile agents
                                  based upon the cooperation of sedentary
                                  agents . . . . . . . . . . . . . . . . . 1228--1243
         Ruth Aguilar-Ponce and   
                Ashok Kumar and   
J. Luis Tecpanecatl-Xihuitl and   
                  Magdy Bayoumi   A network of sensor-based framework for
                                  automated visual surveillance  . . . . . 1244--1271
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 30, Number 4, November, 2007

                   Xiangjian He   Editorial  . . . . . . . . . . . . . . . 1273--1274
            Shinichi Suzuki and   
             Yasushi Shinjo and   
             Toshio Hirotsu and   
                 Kozo Itano and   
                  Kazuhiko Kato   Capability-based egress network access
                                  control by using DNS server  . . . . . . 1275--1282
                   Yanni Wu and   
                  Kuo Zhang and   
                Xiaoge Wang and   
                    Jinlan Tian   Extending metadata with scenarios in
                                  adaptive distributed system  . . . . . . 1283--1294
            M. J. Callaghan and   
                  J. Harkin and   
                E. McColgan and   
            T. M. McGinnity and   
                  L. P. Maguire   Client-server architecture for
                                  collaborative remote experimentation . . 1295--1308
           Carolyn McGregor and   
               Bruce Kneale and   
                     Mark Tracy   On-demand Virtual Neonatal Intensive
                                  Care units supporting rural, remote and
                                  urban healthcare with Bush Babies
                                  Broadband  . . . . . . . . . . . . . . . 1309--1323
                Wenjing Jia and   
             Huaifeng Zhang and   
                   Xiangjian He   Region-based license plate detection . . 1324--1333
               Hatice Gunes and   
               Massimo Piccardi   Bi-modal emotion recognition from
                                  expressive face and body gestures  . . . 1334--1345
                 Junjun Xia and   
                     Lin Ni and   
                        Y. Miao   A new digital implementation of ridgelet
                                  transform for images of dyadic length    1346--1355
              Donn Morrison and   
           Liyanage C. De Silva   Voting ensembles for spoken affect
                                  classification . . . . . . . . . . . . . 1356--1365
              Ben-Nian Wang and   
                   Yang Gao and   
             Zhao-Qian Chen and   
               Jun-Yuan Xie and   
                    Shi-Fu Chen   A two-layered multi-agent reinforcement
                                  learning model and algorithm . . . . . . 1366--1376
               Jung-San Lee and   
                Chin-Chen Chang   Secure communications for cluster-based
                                  ad hoc networks using node identities    1377--1396
    Christopher J. Martinez and   
               Wei-Ming Lin and   
                  Parimal Patel   Optimal XOR hashing for non-uniformly
                                  distributed address lookup in computer
                                  networks . . . . . . . . . . . . . . . . 1397--1427
             Bart Duysburgh and   
            Thijs Lambrecht and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Design and analysis of a stable set-up
                                  protocol for transcoding multicast trees
                                  in active networks . . . . . . . . . . . 1428--1444
             S. A. Al-Talib and   
                  B. M. Ali and   
                  S. Khatun and   
                 S. Subramaniam   Improving the multicast state
                                  scalability in Internet routers by
                                  integrating hash algorithm with
                                  recursive unicast  . . . . . . . . . . . 1445--1454
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 31, Number 1, January, 2008

              Hsu-Yang Kung and   
              Hao-Hsiang Ku and   
                   Che-I Wu and   
                   Ching-Yu Lin   Intelligent and situation-aware
                                  pervasive system to support debris-flow
                                  disaster prediction and alerting in
                                  Taiwan . . . . . . . . . . . . . . . . . 1--18
               Mosaab Daoud and   
               Qusay H. Mahmoud   Monte Carlo simulation-based algorithms
                                  for estimating the reliability of mobile
                                  agent-based systems  . . . . . . . . . . 19--31
                       Xiao Qin   Performance comparisons of load
                                  balancing algorithms for I/O-intensive
                                  workloads on clusters  . . . . . . . . . 32--46
            Ming-Tsung Chen and   
               B. M. T. Lin and   
             Shian-Shyong Tseng   Multicast routing and wavelength
                                  assignment with delay constraints in WDM
                                  networks with heterogeneous capabilities 47--65
            Tushar M. Raste and   
                 D. B. Kulkarni   Design and implementation scheme for
                                  deploying IPv4 over IPv6 tunnel  . . . . 66--72
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 31, Number 2, April, 2008

            Christos Makris and   
          Athanasios Tsakalidis   Trends in peer to peer and service
                                  oriented computing . . . . . . . . . . . 73--74
              Sinuhe Arroyo and   
       Miguel-Angel Sicilia and   
José-Manuel López-Cobo   Patterns of message interchange in
                                  decoupled hypermedia systems . . . . . . 75--92
                 Serena Pastore   The service discovery methods issue: a
                                  web services UDDI specification
                                  framework integrated in a grid
                                  environment  . . . . . . . . . . . . . . 93--107
    Vassiliki Diamadopoulou and   
            Christos Makris and   
             Yannis Panagis and   
          Evangelos Sakkopoulos   Techniques to support Web Service
                                  selection and consumption with QoS
                                  characteristics  . . . . . . . . . . . . 108--130
                   K. Votis and   
                C. Alexakos and   
             B. Vassiliadis and   
               S. Likothanassis   An ontologically principled
                                  service-oriented architecture for
                                  managing distributed e-government nodes  131--148
                 S. Sioutas and   
             E. Sakkopoulos and   
                 L. Drossos and   
                 S. Sirmakessis   Balanced distributed web service lookup
                                  system . . . . . . . . . . . . . . . . . 149--162
      Sampath N. Ranasinghe and   
         Vasilis Friderikos and   
                  Hamid Aghvami   Dynamic proxy assisted mobility support
                                  for third generation peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 163--178
  Dimitris N. Kanellopoulos and   
     Alkiviadis A. Panagopoulos   Exploiting tourism destinations'
                                  knowledge in an RDF-based P2P network    179--200
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 31, Number 3, August, 2008

                Gwo-Jong Yu and   
                Chih-Yung Chang   Congestion control of Bluetooth radio
                                  system by piconet restructuring  . . . . 201--223
                Dhouha Ayed and   
            Chantal Taconet and   
                Guy Bernard and   
                Yolande Berbers   CADeComp: Context-aware deployment of
                                  component-based applications . . . . . . 224--257
                 Li Chunlin and   
                      Li Layuan   Cross-layer optimization policy for QoS
                                  scheduling in computational grid . . . . 258--284
                   Lin Chen and   
             Changjun Jiang and   
                      Junjie Li   VGITS: ITS based on intervehicle
                                  communication networks and grid
                                  technology . . . . . . . . . . . . . . . 285--302
                 Luhua Liao and   
                   Lemin Li and   
                     Sheng Wang   Multicast protection scheme in
                                  survivable WDM optical networks  . . . . 303--316
               James Lembke and   
                 Byung Kyu Choi   Edge-limited scalable QoS flow set-up    317--337
             Ferhat Khendek and   
                     Tong Zheng   Modeling and analysis of value added
                                  services using message sequence charts   338--356
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 31, Number 4, November, 2008

              Javier Varona and   
       Cristina Manresa-Yee and   
           Francisco J. Perales   Hands-free vision-based interface for
                                  computer accessibility . . . . . . . . . 357--374
                Hongjun Liu and   
                   Ping Luo and   
                   Daoshun Wang   A scalable authentication model based on
                                  public keys  . . . . . . . . . . . . . . 375--386
               Wen-Hwa Liao and   
                Yucheng Kao and   
                 Chien-Ming Fan   Data aggregation in wireless sensor
                                  networks using ant colony algorithm  . . 387--401
       Vidhyacharan Bhaskar and   
              Patrick Lallement   Activity routing in a distributed supply
                                  chain: Performance evaluation with two
                                  inputs . . . . . . . . . . . . . . . . . 402--428
                 Bing Zheng and   
           Mohammed Atiquzzaman   A framework to determine bounds of
                                  maximum loss rate parameter of RED queue
                                  for next generation routers  . . . . . . 429--445
                 K. Komathy and   
                P. Narayanasamy   Trust-based evolutionary game model
                                  assisting AODV routing against
                                  selfishness  . . . . . . . . . . . . . . 446--471
                Hongjun Liu and   
                   Ping Luo and   
                   Daoshun Wang   A distributed expansible authentication
                                  model based on Kerberos  . . . . . . . . 472--486
           Carles Garrigues and   
               Sergi Robles and   
                   Joan Borrell   Securing dynamic itineraries for mobile
                                  agent applications . . . . . . . . . . . 487--508
                Haidar Safa and   
            Mohamad Chouman and   
              Hassan Artail and   
                   Marcel Karam   A collaborative defense mechanism
                                  against SYN flooding attacks in IP
                                  networks . . . . . . . . . . . . . . . . 509--534
         Prasan Kumar Sahoo and   
            Chih-Yung Chang and   
                Sheng-Wen Chang   Novel route maintenance protocols for
                                  the Bluetooth ad hoc network with
                                  mobility . . . . . . . . . . . . . . . . 535--558
                  Weili Han and   
               Xingdong Shi and   
                   Ronghua Chen   Process-context aware matchmaking for
                                  web service composition  . . . . . . . . 559--576
              G. Varaprasad and   
        R. S. D. Wahidabanu and   
                  P. Venkataram   An efficient resource allocation scheme
                                  for multimedia applications in MANET . . 577--584
                Eric Gamess and   
              Rina Surós   An upper bound model for TCP and UDP
                                  throughput in IPv4 and IPv6  . . . . . . 585--602
            Yiouli Kritikou and   
     Panagiotis Demestichas and   
        Evgenia Adamopoulou and   
   Konstantinos Demestichas and   
          Michael Theologou and   
                  Maria Paradia   User Profile Modeling in the context of
                                  web-based learning management systems    603--627
               Venet Osmani and   
 Sasitharan Balasubramaniam and   
                 Dmitri Botvich   Human activity recognition in pervasive
                                  health-care: Supporting efficient remote
                                  collaboration  . . . . . . . . . . . . . 628--655
                 P. Khadivi and   
                  S. Samavi and   
                     T. D. Todd   Multi-constraint QoS routing using a new
                                  single mixed metrics . . . . . . . . . . 656--676
             Beatriz Prieto and   
            Fernando Tricas and   
             Juan J. Merelo and   
               Antonio Mora and   
                 Alberto Prieto   Visualizing the evolution of a web-based
                                  social network . . . . . . . . . . . . . 677--698
      Mouhammd Al-Kasassbeh and   
                        Mo Adda   Analysis of mobile agents in network
                                  fault management . . . . . . . . . . . . 699--711
                 Janus S. Liang   The troubleshooting task implementation
                                  in automotive chassis using virtual
                                  interactive technique and
                                  knowledge-based approach . . . . . . . . 712--734
            Xiang-Yang Wang and   
                Pan-Pan Niu and   
                         Wei Qi   A new adaptive digital audio
                                  watermarking based on support vector
                                  machine  . . . . . . . . . . . . . . . . 735--749
        Hussein Abdel-Jaber and   
              Mike Woodward and   
               Fadi Thabtah and   
                   Amer Abu-Ali   Performance evaluation for DRED
                                  discrete-time queueing network
                                  analytical model . . . . . . . . . . . . 750--770
                  Y. C. Yee and   
               K. N. Choong and   
             Andy L. Y. Low and   
                      S. W. Tan   SIP-based proactive and adaptive
                                  mobility management framework for
                                  heterogeneous networks . . . . . . . . . 771--792
             Juan J. Samper and   
          Pedro A. Castillo and   
             Lourdes Araujo and   
               J. J. Merelo and   
 Óscar Cordón and   
                Fernando Tricas   NectaRSS, an intelligent RSS feed reader 793--806
               Wen-Hwa Liao and   
               Hsiao-Hsien Wang   An asynchronous MAC protocol for
                                  wireless sensor networks . . . . . . . . 807--820
              Jianjun Zhang and   
                   Ling Liu and   
        Lakshmish Ramaswamy and   
                      Calton Pu   PeerCast: Churn-resilient end system
                                  multicast on heterogeneous overlay
                                  networks . . . . . . . . . . . . . . . . 821--850
             Kazuya Odagiri and   
            Rihito Yaegashi and   
          Masaharu Tadauchi and   
                  Naohiro Ishii   Secure DACS Scheme . . . . . . . . . . . 851--861
              Javed I. Khan and   
                Sajid S. Shaikh   Computing in social networks with
                                  relationship algebra . . . . . . . . . . 862--878
                Ibrahim Ozcelik   Interconnection of CAN segments through
                                  IEEE 802.16 wireless MAN . . . . . . . . 879--890
           Bhuvan Urgaonkar and   
                Prashant Shenoy   Cataclysm: Scalable overload policing
                                  for Internet applications  . . . . . . . 891--920
                   K. Salah and   
                  P. Calyam and   
                   M. I. Buhari   Assessing readiness of IP networks to
                                  support desktop videoconferencing using
                                  OPNET  . . . . . . . . . . . . . . . . . 921--943
                 Haibin Cai and   
                    Fang Pu and   
               Runcai Huang and   
                     Qiying Cao   A novel ANN-based service selection
                                  model for ubiquitous computing
                                  environments . . . . . . . . . . . . . . 944--965
             Eleni Georgiou and   
        Marios D. Dikaiakos and   
            Athena Stassopoulou   On the properties of spam-advertised URL
                                  addresses  . . . . . . . . . . . . . . . 966--985
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 32, Number 1, January, 2009

              Tzu-Chi Huang and   
              Ce-Kuen Shieh and   
                    Yu-Ben Miao   Bottleneck Active Node Detouring for
                                  capsule-based active network . . . . . . 1--30
              Xiaohong Guan and   
                   Wei Wang and   
               Xiangliang Zhang   Fast intrusion detection based on a
                                  non-negative matrix factorization model  31--44
                      Di Wu and   
                    Ye Tian and   
                    Kam-Wing Ng   Resilient and efficient load balancing
                                  in distributed hash tables . . . . . . . 45--60
               JungYul Choi and   
                Jaebong Lee and   
               ShinJung Woo and   
                ByoungKwon Shim   An engineering approach to the design of
                                  a BcN control network  . . . . . . . . . 61--77
                Pete Davies and   
              Theodore Tryfonas   A lightweight web-based vulnerability
                                  scanner for small-scale computer network
                                  security assessment  . . . . . . . . . . 78--95
              Hassan Artail and   
               Manal Shihab and   
                    Haidar Safa   A distributed mobile database
                                  implementation on Pocket PC mobile
                                  devices communicating over Bluetooth . . 96--115
Konstantinos P. Demestichas and   
     Evgenia F. Adamopoulou and   
      John G. Markoulidakis and   
           Michael E. Theologou   Towards Anonymous Mobile Community
                                  services . . . . . . . . . . . . . . . . 116--134
          Giancarlo Fortino and   
          Carlo Mastroianni and   
                    Wilma Russo   A hierarchical control protocol for
                                  group-oriented playbacks supported by
                                  content distribution networks  . . . . . 135--157
                    Meng Yu and   
                   Peng Liu and   
                     Wanyu Zang   The implementation and evaluation of a
                                  recovery system for workflows  . . . . . 158--183
              Wade A. Fagen and   
    João W. Cangussu and   
                      Ram Dantu   A virtual environment for network
                                  testing  . . . . . . . . . . . . . . . . 184--214
      Chryssa A. Papagianni and   
       Nikolaos D. Tselikas and   
      Evangelos A. Kosmatos and   
     Stauros Papapanagiotou and   
            Iakovos S. Venieris   Performance evaluation study for
                                  QoS-aware triple play services over
                                  entry-level xDSL connections . . . . . . 215--225
            Chin-Chen Chang and   
                   Jung-San Lee   Robust $t$-out-of-$n$ oblivious transfer
                                  mechanism based on CRT . . . . . . . . . 226--235
        Muhammad N. Marsono and   
      M. Watheq El-Kharashi and   
                   Fayez Gebali   A spam rejection scheme during SMTP
                                  sessions based on layer-3 e-mail
                                  classification . . . . . . . . . . . . . 236--257
                   Hua Wang and   
                   Zhao Shi and   
                       Shuai Li   Multicast routing for delay variation
                                  bound using a modified ant colony
                                  algorithm  . . . . . . . . . . . . . . . 258--272
             Yuh-Shyan Chen and   
                Yun-Wei Lin and   
                Chih-Yung Chang   An overlapping communication protocol
                                  using improved time-slot leasing for
                                  Bluetooth WPANs  . . . . . . . . . . . . 273--292
          Francisco Almeida and   
             Vicente Blanco and   
             Carlos Delgado and   
         Francisco de Sande and   
           Adrián Santos   IDEWEP: Web service for astronomical
                                  parallel image deconvolution . . . . . . 293--313
                D. Di Sorte and   
              M. Femminella and   
                       G. Reali   QoS-enabled multicast for delivering
                                  live events in a Digital Cinema scenario 314--344
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 2, March, 2009

                Wanlei Zhou and   
                     Yang Xiang   Network and system security  . . . . . . 345--346
                  Chuan Yue and   
                   Haining Wang   Profit-aware overload protection in
                                  E-commerce Web sites . . . . . . . . . . 347--356
           Md Rafiqul Islam and   
                Wanlei Zhou and   
                  Minyi Guo and   
                     Yang Xiang   An innovative analyser for
                                  multi-classifier e-mail classification
                                  based on grey list analysis  . . . . . . 357--366
                Wei-Zhou Lu and   
                Wei-Xuan Gu and   
                  Shun-Zheng Yu   One-way queuing delay measurement and
                                  its application on detecting DDoS attack 367--376
                     Bai Li and   
                    Lynn Batten   Using mobile agents to recover from node
                                  and database compromise in path-based
                                  DoS attacks in wireless sensor networks  377--387
            Suriadi Suriadi and   
                 Ernest Foo and   
            Audun Jòsang   A user-centric federated single sign-on
                                  system . . . . . . . . . . . . . . . . . 388--401
                 Deqing Zou and   
                  Ligang He and   
                    Hai Jin and   
                  Xueguang Chen   CRBAC: Imposing multi-grained
                                  constraints on the RBAC model in the
                                  multi-application environment  . . . . . 402--411
                   Jian Cao and   
                Jinjun Chen and   
                Haiyan Zhao and   
                      Minglu Li   A policy-based authorization model for
                                  workflow-enabled dynamic process
                                  management . . . . . . . . . . . . . . . 412--422
                   Wenyu Qu and   
         Masaru Kitsuregawa and   
                  Hong Shen and   
                  Zhiguang Shan   A novel fault-tolerant execution model
                                  by using of mobile agents  . . . . . . . 423--432
            Muhammad Younas and   
                 Irfan Awan and   
               Laurence T. Yang   Special issue on service oriented
                                  computing and advanced network
                                  applications . . . . . . . . . . . . . . 433
     Agustinus Borgy Waluyo and   
               David Taniar and   
               Wenny Rahayu and   
                Bala Srinivasan   Mobile service oriented architectures
                                  for NN-queries . . . . . . . . . . . . . 434--447
              Arjan Durresi and   
            Vamsi Paruchuri and   
                Leonard Barolli   Fast autonomous system traceback . . . . 448--454
            D. R. W. Holton and   
                   I. Nafea and   
                  M. Younas and   
                        I. Awan   A class-based scheme for E-commerce web
                                  servers: Formal specification and
                                  performance evaluation . . . . . . . . . 455--460
                I. Al-Oqily and   
                    A. Karmouch   Towards automating overlay network
                                  management . . . . . . . . . . . . . . . 461--473
                  M. Lozano and   
                 P. Morillo and   
        J. M. Orduña and   
                  V. Cavero and   
                    G. Vigueras   A new system architecture for crowd
                                  simulation . . . . . . . . . . . . . . . 474--482
                  Yan Zhang and   
           Laurence T. Yang and   
                 Jianhua Ma and   
                      Jun Zheng   Quantitative analysis of location
                                  management and QoS in wireless networks  483--489
             Mieso K. Denko and   
           Elhadi Shakshuki and   
                   Haroon Malik   Enhanced cross-layer based middleware
                                  for mobile ad hoc networks . . . . . . . 490--499
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 3, May, 2009

            Mostafa Abd-El-Barr   Topological network design: a survey . . 501--509
             Byoung-Dai Lee and   
            Jon B. Weissman and   
                Young-Kwang Nam   Adaptive middleware supporting scalable
                                  performance for high-end network
                                  services . . . . . . . . . . . . . . . . 510--524
                 Chunlin Li and   
                      Layuan Li   Three-layer control policy for grid
                                  resource management  . . . . . . . . . . 525--537
             Yuh-Jzer Joung and   
                   Chu-Jui Yang   Email licensing  . . . . . . . . . . . . 538--549
               Selim Ciraci and   
    Ibrahim Körpeo\ugu and   
         Özgür Ulusoy   Reducing query overhead through route
                                  learning in unstructured peer-to-peer
                                  network  . . . . . . . . . . . . . . . . 550--567
                Songtao Guo and   
                  Gang Feng and   
              Xiaofeng Liao and   
                        Qun Liu   Novel delay-range-dependent stability
                                  analysis of the second-order congestion
                                  control algorithm with heterogeneous
                                  communication delays . . . . . . . . . . 568--577
            Eric Jui-Lin Lu and   
              Yung-Fa Huang and   
                    Shu-Chiu Lu   ML-Chord: a multi-layered P2P resource
                                  sharing model  . . . . . . . . . . . . . 578--588
                Shi-Jen Lin and   
                  Ding-Chyu Liu   An incentive-based electronic payment
                                  scheme for digital content transactions
                                  over the Internet  . . . . . . . . . . . 589--598
          Thomas E. Carroll and   
                   Daniel Grosu   A secure and anonymous voter-controlled
                                  election scheme  . . . . . . . . . . . . 599--606
                Y. Tachwali and   
               W. J. Barnes and   
                       H. Refai   Configurable symbol synchronizers for
                                  software-defined radio applications  . . 607--615
                I-Ching Hsu and   
                 Li-Pin Chi and   
                Sheau-Shong Bor   A platform for transcoding heterogeneous
                                  markup documents using ontology-based
                                  metadata . . . . . . . . . . . . . . . . 616--629
      Konstantinos Samdanis and   
         Vasilis Friderikos and   
               A. Hamid Aghvami   Autonomic hierarchical reconfiguration
                                  for wireless access networks . . . . . . 630--641
                      Li Ou and   
                   Xubin He and   
                    Jizhong Han   An efficient design for fast memory
                                  registration in RDMA . . . . . . . . . . 642--651
            Jenn-Hwan Tarng and   
            Bing-Wen Chuang and   
                   Pei-Chen Liu   A relay node deployment method for
                                  disconnected wireless sensor networks:
                                  Applied in indoor environments . . . . . 652--659
               Satish Chand and   
             Bijendra Kumar and   
                        Hari Om   Video Data Delivery using Slotted
                                  Patching . . . . . . . . . . . . . . . . 660--665
              Oznur Ozkasap and   
                Mine Caglar and   
                     Ali Alagoz   Principles and performance analysis of
                                  SeCond: a system for epidemic
                                  peer-to-peer content distribution  . . . 666--683
             Lambros Boukas and   
       Georgios Kambourakis and   
             Stefanos Gritzalis   Pandora: an SMS-oriented m-informational
                                  system for educational realms  . . . . . 684--702
              Babek Abbasov and   
               Serdar Korukoglu   Effective RED: an algorithm to improve
                                  RED's performance by reducing packet
                                  loss rate  . . . . . . . . . . . . . . . 703--709
              Zonghua Zhang and   
                     Pin-Han Ho   Janus: a dual-purpose analytical model
                                  for understanding, characterizing and
                                  countermining multi-stage collusive
                                  attacks in enterprise networks . . . . . 710--720
                    Li Feng and   
                   Wei Wang and   
                   Lina Zhu and   
                       Yi Zhang   Predicting intrusion goal using dynamic
                                  Bayesian network with transfer
                                  probability estimation . . . . . . . . . 721--732
      Mohammad Hamed Firooz and   
     Alireza Nasiri Avanaki and   
     Mohammad Reza Pakravan and   
                  Keivan Ronasi   A fast and reliable multi-sender
                                  algorithm for peer-to-peer networks  . . 733--740
              Tzu-Chi Huang and   
           Sherali Zeadally and   
         Naveen Chilamkurti and   
                  Ce-Kuen Shieh   Design, implementation, and evaluation
                                  of a Programmable Bandwidth Aggregation
                                  System for home networks . . . . . . . . 741--759
                 Li Chunlin and   
              Zhong Jin Xiu and   
                      Li Layuan   Resource scheduling with conflicting
                                  objectives in grid environments: Model
                                  and evaluation . . . . . . . . . . . . . 760--769
                  J. H. Abawajy   Adaptive hierarchical scheduling policy
                                  for enterprise grid computing systems    770--779
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 4, July, 2009

                    Li Feng and   
                    Zili Li and   
                       Yi Zhang   Security bootstrap model of key
                                  pre-sharing by polynomial group in
                                  mobile Ad Hoc Network  . . . . . . . . . 781--787
                 Jiankun Hu and   
                   Fengling Han   A pixel-based scrambling scheme for
                                  digital medical images protection  . . . 788--794
                  C. Bouras and   
                E. Giannaka and   
          Thrasyvoulos Tsiatsos   Identifying best practices for
                                  supporting broadband growth: Methodology
                                  and analysis . . . . . . . . . . . . . . 795--807
      Manuel Sánchez and   
       Gabriel López and   
Óscar Cánovas and   
Antonio F. Gómez-Skarmeta   Performance analysis of a cross-layer
                                  SSO mechanism for a roaming
                                  infrastructure . . . . . . . . . . . . . 808--823
      Mouhammd Al-Kasassbeh and   
                        Mo Adda   Network fault detection with Wiener
                                  filter-based agent . . . . . . . . . . . 824--833
             Chao-Tung Yang and   
             Ming-Feng Yang and   
               Wen-Chung Chiang   Enhancement of anticipative recursively
                                  adjusting mechanism for redundant
                                  parallel file transfer in data grids . . 834--845
              Sergio Ilarri and   
               Eduardo Mena and   
           Arantza Illarramendi   A system based on mobile agents to test
                                  mobile computing applications  . . . . . 846--865
             Kuei-Ping Shih and   
            Hung-Chang Chen and   
             Chien-Min Chou and   
                     Bo-Jun Liu   On target coverage in wireless
                                  heterogeneous sensor networks with
                                  multiple sensing units . . . . . . . . . 866--877
         Prasan Kumar Sahoo and   
             Jang-Ping Sheu and   
                  Yu-Chia Chang   Performance evaluation of wireless
                                  sensor network with hybrid channel
                                  access mechanism . . . . . . . . . . . . 878--888
                     Dan Wu and   
            Chi Hong Cheong and   
                   Man Hon Wong   Supporting asynchronous update for
                                  distributed data cubes . . . . . . . . . 889--900
                 Jiaming Li and   
                  Chai Kiat Yeo   Content and overlay-aware scheduling for
                                  peer-to-peer streaming in fluctuating
                                  networks . . . . . . . . . . . . . . . . 901--912
              Javed I. Khan and   
                Sajid S. Shaikh   A phenotype reputation estimation
                                  function and its study of resilience to
                                  social attacks . . . . . . . . . . . . . 913--924
       Robert L. R. Mattson and   
                  Somnath Ghosh   HTTP-MPLEX: an enhanced hypertext
                                  transfer protocol and its performance
                                  evaluation . . . . . . . . . . . . . . . 925--939
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 5, September, 2009

          Giancarlo Fortino and   
              Carlo Mastroianni   Next generation content networks . . . . 941--942
             Jayashree Ravi and   
                 Zhifeng Yu and   
                    Weisong Shi   A survey on dynamic Web content
                                  generation and delivery techniques . . . 943--960
               Gilles Fedak and   
                   Haiwu He and   
                Franck Cappello   BitDew: a data management and
                                  distribution service with multi-protocol
                                  file transfer and metadata abstraction   961--975
            Mukaddim Pathan and   
                 Rajkumar Buyya   Resource discovery and
                                  request-redirection for dynamic load
                                  sharing in multi-provider peering
                                  content delivery networks  . . . . . . . 976--990
               Jaime Lloret and   
              Miguel Garcia and   
                  Diana Bri and   
                   Juan R. Diaz   Study and performance of a group-based
                                  Content Delivery Network . . . . . . . . 991--999
            Benjamin Molina and   
       Salvatore F. Pileggi and   
              Manuel Esteve and   
                Carlos E. Palau   A negotiation framework for content
                                  distribution in mobile transient
                                  networks . . . . . . . . . . . . . . . . 1000--1011
              James Broberg and   
             Rajkumar Buyya and   
                     Zahir Tari   MetaCDN: Harnessing `Storage Clouds' for
                                  high performance content delivery  . . . 1012--1022
               Ying-Dar Lin and   
                Chun-Nan Lu and   
             Yuan-Cheng Lai and   
               Wei-Hao Peng and   
                   Po-Ching Lin   Application classification using packet
                                  size distribution and port association   1023--1030
                  Ling Wang and   
             Yahia Tachwali and   
              Pramode Verma and   
                    Anjan Ghosh   Impact of bounded delay on throughput in
                                  multi-hop networks . . . . . . . . . . . 1031--1038
                   K. Salah and   
                      M. Hamawi   Comparative packet-forwarding
                                  measurement of three popular operating
                                  systems  . . . . . . . . . . . . . . . . 1039--1048
            Behnoosh Hariri and   
      Shervin Shirmohammadi and   
     Mohammad Reza Pakravan and   
         Mohammad Hossein Alavi   An adaptive latency mitigation scheme
                                  for massively multiuser virtual
                                  environments . . . . . . . . . . . . . . 1049--1063
                     Yuhui Deng   Deconstructing Network Attached Storage
                                  systems  . . . . . . . . . . . . . . . . 1064--1072
                   Fang-Yie Leu   A novel network mobility handoff scheme
                                  using SIP and SCTP for multimedia
                                  applications . . . . . . . . . . . . . . 1073--1091
Iván Martínez-Ortiz and   
    José-Luis Sierra and   
Baltasar Fernández-Manjón and   
Alfredo Fernández-Valmayor   Language engineering techniques for the
                                  development of e-learning applications   1092--1105
      Chenfeng Vincent Zhou and   
         Christopher Leckie and   
           Shanika Karunasekera   Decentralized multi-dimensional alert
                                  correlation for collaborative intrusion
                                  detection  . . . . . . . . . . . . . . . 1106--1123
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 6, November, 2009

           Mohammed Tarique and   
              Kemal E. Tepe and   
                Sasan Adibi and   
                 Shervin Erfani   Survey of multipath routing protocols
                                  for mobile ad hoc networks . . . . . . . 1125--1143
               Wen-Hwa Liao and   
                   Wen-Ming Yen   Power-saving scheduling with a QoS
                                  guarantee in a mobile WiMAX system . . . 1144--1152
            Neng-Chung Wang and   
                  Chao-Yang Lee   A reliable QoS aware routing protocol
                                  with slot assignment for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1153--1166
            R. Martí and   
                  S. Robles and   
  A. Martín-Campillo and   
                    J. Cucurull   Providing early resource allocation
                                  during emergencies: the mobile triage
                                  tag  . . . . . . . . . . . . . . . . . . 1167--1182
           Mohamed K. Watfa and   
                 Omar Mirza and   
                 Jad Kawtharani   BARC: a Battery Aware Reliable
                                  Clustering algorithm for sensor networks 1183--1193
Martín López-Nores and   
  Jorge García-Duque and   
 José J. Pazos-Arias and   
Yolanda Blanco-Fernández and   
        Manuel Ramos-Cabrer and   
          Alberto Gil-Solla and   
Rebeca P. Díaz-Redondo and   
     Ana Fernández-Vilas   KEPPAN: Knowledge exploitation for
                                  proactively-planned ad-hoc networks  . . 1194--1209
            Cuneyt Bayilmis and   
           Ersoy Kelebekler and   
              Ismail Erturk and   
                Celal Ceken and   
                Ibrahim Ozcelik   Integration of a speech activated
                                  control system and a wireless
                                  interworking unit for a CAN-based
                                  distributed application  . . . . . . . . 1210--1218
             Xuan Dau Hoang and   
                 Jiankun Hu and   
                   Peter Bertok   A program-based anomaly intrusion
                                  detection scheme using multiple
                                  detection engines and fuzzy inference    1219--1228
             Chien-Chih Lai and   
               Ren-Guey Lee and   
           Chun-Chieh Hsiao and   
             Hsin-Sheng Liu and   
                Chun-Chang Chen   A H-QoS-demand personalized home
                                  physiological monitoring system over a
                                  wireless multi-hop relay network for
                                  mobile home healthcare applications  . . 1229--1241
      Bruno Van Den Bossche and   
       Bart De Vleeschauwer and   
               Tom Verdickt and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Autonomic microcell assignment in
                                  massively distributed online virtual
                                  environments . . . . . . . . . . . . . . 1242--1256
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 33, Number 1, January, 2010

                 Chun-Ta Li and   
               Min-Shiang Hwang   An efficient biometrics-based remote
                                  user authentication scheme using smart
                                  cards  . . . . . . . . . . . . . . . . . 1--5
                   K. Salah and   
                     A. Kahtani   Performance evaluation comparison of
                                  Snort NIDS under Linux and Windows
                                  Server . . . . . . . . . . . . . . . . . 6--15
         Giorgos Karopoulos and   
       Georgios Kambourakis and   
         Stefanos Gritzalis and   
          Elisavet Konstantinou   A framework for identity privacy in SIP  16--28
             Jianhong Zhang and   
              Chenglian Liu and   
                    Yixian Yang   An efficient secure proxy verifiably
                                  encrypted signature scheme . . . . . . . 29--34
              Nader Mohamed and   
             Jameela Al-Jaroodi   Self-configured
                                  multiple-network-interface socket  . . . 35--42
              Ming-Wen Tong and   
              Zong-Kai Yang and   
                  Qing-Tang Liu   A novel model of adaptation
                                  decision-taking engine in multimedia
                                  adaptation . . . . . . . . . . . . . . . 43--49
               Youtao Zhang and   
                   Jun Yang and   
                  Weijia Li and   
              Linzhang Wang and   
                   Lingling Jin   An authentication scheme for locating
                                  compromised sensor nodes in WSNs . . . . 50--62
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 2, March, 2010

                Junqi Zhang and   
             Vijay Varadharajan   Wireless sensor network key management
                                  survey and taxonomy  . . . . . . . . . . 63--75
                  Weili Han and   
                     Min Xu and   
               Weidong Zhao and   
                       Guofu Li   A trusted decentralized access control
                                  framework for the client/server
                                  architecture . . . . . . . . . . . . . . 76--83
           Matthias Strobbe and   
          Olivier Van Laere and   
               Samuel Dauwe and   
                Bart Dhoedt and   
             Filip De Turck and   
             Piet Demeester and   
      Christof van Nimwegen and   
           Jeroen Vanattenhoven   Interest based selection of user
                                  generated content for rich communication
                                  services . . . . . . . . . . . . . . . . 84--97
              Cheng-Fu Chou and   
           William C. Cheng and   
                Leana Golubchik   Performance study of online batch-based
                                  digital signature schemes  . . . . . . . 98--114
                    Ming Xu and   
              Shuigeng Zhou and   
                Jihong Guan and   
                     Xiaohua Hu   A path-traceable query routing mechanism
                                  for search in unstructured peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 115--127
          Eduardo Moschetta and   
         Rodolfo S. Antunes and   
           Marinho P. Barcellos   Flexible and secure service discovery in
                                  ubiquitous computing . . . . . . . . . . 128--140
               Jenn-Wei Lin and   
                  Wei-Shou Wang   An efficient reconstruction approach for
                                  improving Bluetree scatternet formation
                                  in personal area networks  . . . . . . . 141--155
                   Ming-Yang Su   Discovery and prevention of attack
                                  episodes by frequent episodes mining and
                                  finite state machines  . . . . . . . . . 156--167
                Haidar Safa and   
              Hassan Artail and   
                   Mirna Nahhas   A cache invalidation strategy for mobile
                                  networks . . . . . . . . . . . . . . . . 168--182
             Yuh-Jzer Joung and   
                  Zhang-Wen Lin   On the self-organization of a hybrid
                                  peer-to-peer system  . . . . . . . . . . 183--202
                      Anonymous   Special Issue of Journal of Network and
                                  Computer Applications on ``Dependable
                                  Multimedia Communications: Systems,
                                  Services, and Applications'' . . . . . . 203
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 3, May, 2010

      Muhammad Khurram Khan and   
              Mohamed Kamel and   
                   Xudong Jiang   Special issue on: Recent advances and
                                  future directions in biometrics personal
                                  identification . . . . . . . . . . . . . 205--206
                    Peng Li and   
                   Xin Yang and   
                    Kai Cao and   
               Xunqiang Tao and   
               Ruifang Wang and   
                       Jie Tian   An alignment-free fingerprint
                                  cryptosystem based on fuzzy vault scheme 207--220
                  Eryun Liu and   
                Jimin Liang and   
               Liaojun Pang and   
                    Min Xie and   
                       Jie Tian   Minutiae and modified Biocode fusion for
                                  fingerprint-based key generation . . . . 221--235
                Chulhan Lee and   
                     Jaihie Kim   Cancelable fingerprint templates using
                                  minutiae-based bit-strings . . . . . . . 236--246
                    Miao Qi and   
                 Yinghua Lu and   
                    Ning Du and   
                Yinan Zhang and   
               Chengxi Wang and   
                       Jun Kong   A novel image hiding approach based on
                                  correlation analysis for secure
                                  multimodal biometrics  . . . . . . . . . 247--257
                    Kai Cao and   
                   Xin Yang and   
               Xunqiang Tao and   
                    Peng Li and   
                  Yali Zang and   
                       Jie Tian   Combining features for distorted
                                  fingerprint matching . . . . . . . . . . 258--267
            Neyire Deniz Sarier   Improving the accuracy and storage cost
                                  in biometric remote authentication
                                  schemes  . . . . . . . . . . . . . . . . 268--274
                    Zhi Liu and   
                 Yilong Yin and   
               Hongjun Wang and   
             Shangling Song and   
                      Qingli Li   Finger vein recognition with manifold
                                  learning . . . . . . . . . . . . . . . . 275--282
                Dong-Ju Kim and   
            Jeong-Hoon Shin and   
                Kwang-Seok Hong   Teeth recognition based on multiple
                                  attempts in mobile device  . . . . . . . 283--292
 David Delgado-Gómez and   
             Federico Sukno and   
               David Aguado and   
           Carlos Santacruz and   
 Antonio Artés-Rodriguez   Individual identification using
                                  personality traits . . . . . . . . . . . 293--299
             Hunny Mehrotra and   
           Banshidhar Majhi and   
                 Phalguni Gupta   Robust iris indexing scheme using
                                  geometric hashing of SIFT keypoints  . . 300--313
             Jian-Gang Wang and   
                  Eric Sung and   
                    Wei-Yun Yau   Incremental two-dimensional linear
                                  discriminant analysis with applications
                                  to face recognition  . . . . . . . . . . 314--322
             Jianzhong Wang and   
               Baoxue Zhang and   
                Shuyan Wang and   
                    Miao Qi and   
                       Jun Kong   An adaptively weighted sub-pattern
                                  locality preserving projection for face
                                  recognition  . . . . . . . . . . . . . . 323--332
              Kumiko Yasuda and   
            Daigo Muramatsu and   
            Satoshi Shirato and   
              Takashi Matsumoto   Visual-based online signature
                                  verification using features extracted
                                  from video . . . . . . . . . . . . . . . 333--341
            Siraj A. Shaikh and   
            Joseph R. Rabaiotti   Characteristic trade-offs in designing
                                  large-scale biometric-based identity
                                  management systems . . . . . . . . . . . 342--351
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 4, July, 2010

              Chung-Nan Lee and   
             Yung-Cheng Kao and   
                   Ming-Te Tsai   A vEB-tree-based architecture for
                                  interactive video on demand services in
                                  peer-to-peer networks  . . . . . . . . . 353--362
           Neelofer Tamboli and   
                 Mohamed Younis   Coverage-aware connectivity restoration
                                  in mobile sensor networks  . . . . . . . 363--374
            Leo Carro-Calvo and   
        Sancho Salcedo-Sanz and   
  Jose A. Portilla-Figueras and   
      E. G. Ortiz-García   A genetic algorithm with switch-device
                                  encoding for optimal partition of
                                  switched industrial Ethernet networks    375--382
                   Lei Wang and   
               Ruizhong Wei and   
                 Yaping Lin and   
                        Bo Wang   A clique base node scheduling method for
                                  wireless sensor networks . . . . . . . . 383--396
                 Feng Zhong and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Enabling inter-PMIPv6-domain handover
                                  with traffic distributors  . . . . . . . 397--409
            Christos Bouras and   
       Vassilis Poulopoulos and   
               Vassilis Tsogkas   Adaptation of RSS feeds based on the
                                  user profile and on the end device . . . 410--421
                Yuwang Yang and   
             Chunshan Zhong and   
                  Yamin Sun and   
                    Jingyu Yang   Network coding based reliable disjoint
                                  and braided multipath routing for sensor
                                  networks . . . . . . . . . . . . . . . . 422--432
             Arthur Callado and   
              Judith Kelner and   
               Djamel Sadok and   
   Carlos Alberto Kamienski and   
         Stênio Fernandes   Better network traffic identification
                                  through the independent combination of
                                  techniques . . . . . . . . . . . . . . . 433--446
  D. González-Ortega and   
   F. J. Díaz-Pernas and   
M. Martínez-Zarzuela and   
M. Antón-Rodríguez and   
  J. F. Díez-Higuera and   
                D. Boto-Giralda   Real-time hands, face and facial
                                  features detection and tracking:
                                  Application to cognitive rehabilitation
                                  tests monitoring . . . . . . . . . . . . 447--466
              Chih-Peng Lin and   
                Jenhui Chen and   
                Hsing-Lung Chen   An efficient bandwidth allocation
                                  algorithm for real-time VBR stream
                                  transmission under IEEE 802.16 wireless
                                  networks . . . . . . . . . . . . . . . . 467--476
    Javad Akbari Torkestani and   
          Mohammad Reza Meybodi   An efficient cluster-based CDMA/TDMA
                                  scheme for wireless mobile ad-hoc
                                  networks: a learning automata approach   477--490
        Abdun Naser Mahmood and   
                 Jiankun Hu and   
                 Zahir Tari and   
             Christopher Leckie   Critical infrastructure protection:
                                  Resource efficient sampling to improve
                                  detection of less frequent patterns in
                                  network traffic  . . . . . . . . . . . . 491--502
     Henrique S. L. Pequeno and   
         George A. M. Gomes and   
      Rossana M. C. Andrade and   
    José N. de Souza and   
            Miguel F. de Castro   FrameIDTV: a framework for developing
                                  interactive applications on digital
                                  television environments  . . . . . . . . 503--511
                  Hui Cheng and   
               Xingwei Wang and   
            Shengxiang Yang and   
                  Min Huang and   
                   Jiannong Cao   QoS multicast tree construction in
                                  IP/DWDM optical Internet by bio-inspired
                                  algorithms . . . . . . . . . . . . . . . 512--522
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 5, September, 2010

         Jameela Al-Jaroodi and   
                  Nader Mohamed   Middleware trends for network
                                  applications . . . . . . . . . . . . . . 523--524
                C. Boldrini and   
                   M. Conti and   
               F. Delmastro and   
                  A. Passarella   Context- and social-aware middleware for
                                  opportunistic networks . . . . . . . . . 525--541
           Praveen Madiraju and   
           Srilaxmi Malladi and   
         Janaka Balasooriya and   
            Arthi Hariharan and   
           Sushil K. Prasad and   
                  Anu Bourgeois   A methodology for engineering
                                  collaborative and ad-hoc mobile
                                  applications using SyD middleware  . . . 542--555
  Jordi Pujol-Ahulló and   
Pedro García-López   Enabling portability in advanced
                                  information-centric services over
                                  structured peer-to-peer systems  . . . . 556--568
          Bruno P. S. Rocha and   
         Daniel N. O. Costa and   
           Rande A. Moreira and   
       Cristiano G. Rezende and   
     Antonio A. F. Loureiro and   
             Azzedine Boukerche   Adaptive security protocol selection for
                                  mobile computing . . . . . . . . . . . . 569--587
Pedro García López and   
  Raúl Gracia Tinedo and   
   Josep M. Banús Alsina   Moving routing protocols to the user
                                  space in MANET middleware  . . . . . . . 588--602
Víctor Manuel Álvarez García and   
María del Puerto Paule Ruiz and   
Juan Ramón Pérez Pérez   Voice interactive classroom, a
                                  service-oriented software architecture
                                  for speech-enabled learning  . . . . . . 603--610
            Yasser Gadallah and   
       Mohamed Adel Serhani and   
                  Nader Mohamed   Middleware support for service discovery
                                  in special operations mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 611--619
                   Cheng Bo and   
                 Zhang Yang and   
                  Zhou Peng and   
                   Duan Hua and   
                Hu Xiaoxiao and   
                 Wang Zheng and   
                  Chen Junliang   Development of Web-Telecom based hybrid
                                  services orchestration and execution
                                  middleware over convergence networks . . 620--630
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 6, November, 2010

              Jason J. Jung and   
              Chung-Ming Ou and   
          Ngoc Thanh Nguyen and   
                  Chong Gun Kim   Advances on agent-based network
                                  management . . . . . . . . . . . . . . . 631--632
                        Bo Chen   Agent-based artificial immune system
                                  approach for adaptive damage detection
                                  in monitoring networks . . . . . . . . . 633--645
                    Mary Wu and   
                   ChongGun Kim   A cost matrix agent for shortest path
                                  routing in ad hoc networks . . . . . . . 646--652
                Pradeep Ray and   
            N. Parameswaran and   
                    Lundy Lewis   Distributed autonomic management: an
                                  approach and experiment towards managing
                                  service-centric networks . . . . . . . . 653--660
              S. Venkatesan and   
              C. Chellappan and   
           T. Vengattaraman and   
            P. Dhavachelvan and   
                  Anurika Vaish   Advanced mobile agent security models
                                  for code integrity and malicious
                                  availability check . . . . . . . . . . . 661--671
                  Yao-Tien Wang   A dynamic resource management in mobile
                                  agent by artificial neural network . . . 672--681
             Yue-Shan Chang and   
                  Pei-Chun Shih   A resource-awareness information
                                  extraction architecture on mobile grid
                                  environment  . . . . . . . . . . . . . . 682--695
               Umar Manzoor and   
                    Samia Nefti   QUIET: a Methodology for Autonomous
                                  Software Deployment using Mobile Agents  696--706
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 34, Number 1, January, 2011

               S. Subashini and   
                     V. Kavitha   A survey on security issues in service
                                  delivery models of cloud computing . . . 1--11
                Dai-Rui Lin and   
                Chih-I Wang and   
                     D. J. Guan   Efficient vehicle ownership
                                  identification scheme based on
                                  triple-trapdoor chameleon hash function  12--19
           Sireesha Muppala and   
                    Xiaobo Zhou   Coordinated session-based admission
                                  control with statistical learning for
                                  multi-tier Internet applications . . . . 20--29
               Neeraj Kumar and   
                Manoj Kumar and   
                    R. B. Patel   Capacity and interference aware link
                                  scheduling with channel assignment in
                                  wireless mesh networks . . . . . . . . . 30--38
              Marcela Mejia and   
  Néstor Peña and   
       Jose L. Muñoz and   
              Oscar Esparza and   
                Marco A. Alzate   A game theoretic trust model for on-line
                                  distributed evolution of cooperation in
                                  MANETs . . . . . . . . . . . . . . . . . 39--51
         Sanaa Sharafeddine and   
                   Rakan Maddah   A lightweight adaptive compression
                                  scheme for energy-efficient
                                  mobile-to-mobile file sharing
                                  applications . . . . . . . . . . . . . . 52--61
             Sanaa Sharafeddine   Capacity assignment in multiservice
                                  packet networks with soft maximum
                                  waiting time guarantees  . . . . . . . . 62--72
                   Xiong Li and   
               Jian-Wei Niu and   
                    Jian Ma and   
              Wen-Dong Wang and   
                 Cheng-Lian Liu   Cryptanalysis and improvement of a
                                  biometrics-based remote user
                                  authentication scheme using smart cards  73--79
                Biming Tian and   
                   Song Han and   
                 Jiankun Hu and   
                  Tharam Dillon   A mutual-healing key distribution scheme
                                  in wireless sensor networks  . . . . . . 80--88
            Christos Bouras and   
               Eri Giannaka and   
          Thrasyvoulos Tsiatsos   A dynamic management scheme for DVEs . . 89--101
                  Hyuck Han and   
              Hyungsoo Jung and   
              Hyeonsang Eom and   
                     H. Y. Yeom   An efficient skyline framework for
                                  matchmaking applications . . . . . . . . 102--115
                  Song Wang and   
                  Jinli Cao and   
                     Jiankun Hu   A frequency domain subspace blind
                                  channel estimation method for trailing
                                  zero OFDM systems  . . . . . . . . . . . 116--120
                Chih-Lin Hu and   
                   Chien-An Cho   User-provided multimedia content
                                  distribution architecture in mobile and
                                  ubiquitous communication networks  . . . 121--136
          Istemi Ekin Akkus and   
    Öznur Özkasap and   
               M. Reha Civanlar   Peer-to-peer multipoint video
                                  conferencing with layered video  . . . . 137--150
    Joel J. P. C. Rodrigues and   
      Orlando R. E. Pereira and   
           Paulo A. C. S. Neves   Biofeedback data visualization for body
                                  sensor networks  . . . . . . . . . . . . 151--158
           Atif Bin Mansoor and   
              Hassan Masood and   
             Mustafa Mumtaz and   
                  Shoab A. Khan   A feature level multimodal approach for
                                  palmprint identification using
                                  directional subband energies . . . . . . 159--171
                 Mingyu Lim and   
              Bart Kevelham and   
               Niels Nijdam and   
        Nadia Magnenat-Thalmann   Rapid development of distributed
                                  applications using high-level
                                  communication support  . . . . . . . . . 172--182
             Xiaohong Huang and   
                       Maode Ma   A performance model for differentiated
                                  service over single-hop passive star
                                  coupled WDM optical networks . . . . . . 183--193
    Aristides Mpitziopoulos and   
Charalampos Konstantopoulos and   
           Damianos Gavalas and   
              Grammati Pantziou   A pervasive assistive environment for
                                  visually impaired people using wireless
                                  sensor network infrastructure  . . . . . 194--206
            Ameneh Daeinabi and   
  Akbar Ghaffar Pour Rahbar and   
              Ahmad Khademzadeh   VWCA: an efficient clustering algorithm
                                  in vehicular ad hoc networks . . . . . . 207--222
                Pejman Goudarzi   Improving rate allocation for ephemeral
                                  traffic using a second-order algorithm   223--231
                  Tzu-Chi Huang   Universal connection architecture for
                                  interactive applications to achieve
                                  distributed computing  . . . . . . . . . 232--251
                    Song Fu and   
             Cheng-Zhong Xu and   
                   Haiying Shen   Randomized load balancing strategies
                                  with churn resilience in peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 252--261
                   Bo Zhang and   
                  Fangguo Zhang   An efficient public key encryption with
                                  conjunctive-subset keywords search . . . 262--267
Jesús Ibáñez and   
            Carlos Delgado-Mata   Lessons from research on interaction
                                  with virtual environments  . . . . . . . 268--281
                 Fahim Sufi and   
                 Ibrahim Khalil   Faster person identification using
                                  compressed ECG in time critical wireless
                                  telecardiology applications  . . . . . . 282--293
Antonio Ruiz-Martínez and   
Juan Sánchez-Montesinos and   
Daniel Sánchez-Martínez   A mobile network operator-independent
                                  mobile signature service . . . . . . . . 294--311
                 Wenjia Niu and   
                    Gang Li and   
                Zhijun Zhao and   
                   Hui Tang and   
                   Zhongzhi Shi   Multi-granularity context model for
                                  dynamic Web service composition  . . . . 312--326
              Hadi Goudarzi and   
        Amir Hesam Salavati and   
         Mohammad Reza Pakravan   An ant-based rate allocation algorithm
                                  for media streaming in peer to peer
                                  networks: Extension to multiple sessions
                                  and dynamic networks . . . . . . . . . . 327--340
            Marc Liberatore and   
               Bikas Gurung and   
          Brian Neil Levine and   
                 Matthew Wright   Empirical tests of anonymous voice over
                                  IP . . . . . . . . . . . . . . . . . . . 341--350
             Patrik Moravek and   
                Dan Komosny and   
               Radim Burget and   
             Jaroslav Sveda and   
                Tomas Handl and   
                 Lucie Jarosova   Study and performance of localization
                                  methods in IP based networks: Vivaldi
                                  algorithm  . . . . . . . . . . . . . . . 351--367
        E. Costa-Montenegro and   
       J. C. Burguillo-Rial and   
   F. Gil-Castiñeira and   
F. J. González-Castaño   Implementation and analysis of the
                                  BitTorrent protocol with a multi-agent
                                  model  . . . . . . . . . . . . . . . . . 368--383
          Elisavet Konstantinou   Efficient cluster-based group key
                                  agreement protocols for wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 384--393
              Jung Yul Choi and   
              Shin Jung Woo and   
               Byoung Kwon Shim   Reliable service provisioning in
                                  converged multimedia network environment 394--401
          Prajakta Kulkarni and   
                   Yusuf Ozturk   mPHASiS: Mobile patient healthcare and
                                  sensor information system  . . . . . . . 402--417
        William R. Claycomb and   
                   Dongwan Shin   A novel node level security policy
                                  framework for wireless sensor networks   418--428
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 2, March, 2011

                   Jonathan Loo   Special issue on: Efficient and robust
                                  security and services of wireless mesh
                                  networks . . . . . . . . . . . . . . . . 429--431
           Frank A. Zdarsky and   
        Sebastian Robitzsch and   
                  Albert Banchs   Security analysis of wireless mesh
                                  backhauls for mobile networks  . . . . . 432--442
             Shanshan Jiang and   
                       Yuan Xue   Providing survivability against jamming
                                  attack for multi-radio multi-channel
                                  wireless mesh networks . . . . . . . . . 443--454
            Zorana Bankovic and   
                David Fraga and   
    José Manuel Moya and   
        Juan Carlos Vallejo and   
       Pedro Malagón and   
       Álvaro Araujo and   
  Juan-Mariano de Goyeneche and   
               Elena Romero and   
               Javier Blesa and   
          Daniel Villanueva and   
         Octavio Nieto-Taladriz   Improving security in WMNs with
                                  reputation systems and self-organizing
                                  maps . . . . . . . . . . . . . . . . . . 455--463
             Ching-Fang Hsu and   
                Guo-Hua Cui and   
                   Qi Cheng and   
                      Jing Chen   A novel linear multi-secret sharing
                                  scheme for group communication in
                                  wireless mesh networks . . . . . . . . . 464--468
                Yiliang Han and   
                Xiaolin Gui and   
                 Xuguang Wu and   
                  Xiaoyuan Yang   Proxy encryption based secure multicast
                                  in wireless mesh networks  . . . . . . . 469--477
      Okechukwu E. Muogilim and   
              Kok-Keong Loo and   
                 Richard Comley   Wireless mesh network security: a
                                  traffic engineering management approach  478--491
            Raquel Lacuesta and   
               Jaime Lloret and   
              Miguel Garcia and   
        Lourdes Peñalver   Two secure and energy-saving spontaneous
                                  ad-hoc protocol for wireless mesh client
                                  networks . . . . . . . . . . . . . . . . 492--505
         Rafael Lopes Gomes and   
      Waldir Moreira Junior and   
          Eduardo Cerqueira and   
Antônio Jorge Abelém   Using fuzzy link cost and dynamic choice
                                  of link quality metrics to achieve QoS
                                  and QoE in wireless mesh networks  . . . 506--516
                   Altaf Mukati   A survey of memory error correcting
                                  techniques for improved reliability  . . 517--522
         Lucas D. P. Mendes and   
        Joel J. P. C. Rodrigues   A survey on cross-layer solutions for
                                  wireless sensor networks . . . . . . . . 523--534
              Tingting Chen and   
               Ankur Bansal and   
                    Sheng Zhong   A reputation system for wireless mesh
                                  networks using network coding  . . . . . 535--541
       Pere Montolio-Aranda and   
      Joaquin Garcia-Alfaro and   
            David Megías   Improved flooding of broadcast messages
                                  using extended multipoint relaying . . . 542--550
       Duong Nguyen Binh Ta and   
               Suiping Zhou and   
                Wentong Cai and   
                Xueyan Tang and   
                   Rassul Ayani   Multi-objective zone mapping in
                                  large-scale distributed virtual
                                  environments . . . . . . . . . . . . . . 551--561
               Niels Sluijs and   
Frédéric Iterbeke and   
                Tim Wauters and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Cooperative caching versus proactive
                                  replication for location dependent
                                  request patterns . . . . . . . . . . . . 562--574
             Mohammad Bsoul and   
         Ahmad Al-Khasawneh and   
       Emad Eddien Abdallah and   
                  Yousef Kilani   Enhanced Fast Spread Replication
                                  strategy for Data Grid . . . . . . . . . 575--580
             Xiaohong Huang and   
                       Maode Ma   A heuristic adaptive QoS prediction
                                  scheme in single-hop passive star
                                  coupled WDM optical networks . . . . . . 581--588
           Cynthia Villalba and   
              Franco Zambonelli   Towards nature-inspired pervasive
                                  service ecosystems: Concepts and
                                  simulation experiences . . . . . . . . . 589--602
              Jianyong Chen and   
               Huawang Zeng and   
                 Cunying Hu and   
                        Zhen Ji   Optimization between security and delay
                                  of quality-of-service  . . . . . . . . . 603--608
            Sandeep K. Sood and   
              Anil K. Sarje and   
                   Kuldip Singh   A secure dynamic identity based
                                  authentication protocol for multi-server
                                  architecture . . . . . . . . . . . . . . 609--618
                   Hai Dong and   
    Farookh Khadeer Hussain and   
                Elizabeth Chang   A service concept recommendation system
                                  for enhancing the dependability of
                                  semantic service matchmakers in the
                                  service ecosystem environment  . . . . . 619--631
               Fang-Yie Leu and   
                  Ilsun You and   
                 Yao-Tien Huang   A coordinated multiple channel
                                  assignment scheme and AP deployment for
                                  channel reuse in metropolitan scale
                                  wireless networks  . . . . . . . . . . . 632--643
                   Mohamed Saad   Joint admission and power control for
                                  quality-of-service in the wireless
                                  downlink . . . . . . . . . . . . . . . . 644--652
                     Q. Shi and   
                   N. Zhang and   
                 M. Merabti and   
                     R. Askwith   Achieving autonomous fair exchange in
                                  ubiquitous network settings  . . . . . . 653--667
 Anabela Moreira Bernardino and   
Eugénia Moreira Bernardino and   
  Juan Manuel Sanchez-Perez and   
  Juan Antonio Gomez-Pulido and   
    Miguel Angel Vega-Rodriguez   Solving ring loading problems using
                                  bio-inspired algorithms  . . . . . . . . 668--685
            Zoran Milicevic and   
                 Zoran Bojkovic   H.264/AVC standard: a proposal for
                                  selective intra- and optimized
                                  inter-prediction . . . . . . . . . . . . 686--691
                 Yebin Chen and   
                    Ying Li and   
                   Jiankun Wang   On the wide diameter of directed
                                  double-loop networks . . . . . . . . . . 692--696
             Fatna Belqasmi and   
                Roch Glitho and   
                Rachida Dssouli   An overlay network for autonomous
                                  information discovery in the
                                  post-composition registries of ambient
                                  networks . . . . . . . . . . . . . . . . 697--707
                Huo Zhihong and   
                 Zheng Yuan and   
                       Xu Chang   A robust fault-tolerant control strategy
                                  for networked control systems  . . . . . 708--714
                 Yusuf Sani and   
                 Mohamed Othman   A provision-aware fair bandwidth
                                  distribution marker algorithm for
                                  DiffServ networks  . . . . . . . . . . . 715--721
                   Ming-Yang Su   Using clustering to improve the
                                  KNN-based classifiers for online anomaly
                                  network traffic identification . . . . . 722--730
         Naser Movahhedinia and   
  Behrouz Shahgholi Ghahfarokhi   Performance analysis of Bluetooth
                                  asynchronous connection-less service . . 731--738
                 Chunlin Li and   
                      Layuan Li   Two-level market solution for services
                                  composition optimization in mobile grid  739--749
                      Li Yu and   
                   Maode Ma and   
                 Weidong Hu and   
                   Zibo Shi and   
                     Yantai Shu   Design of parameter tunable robust
                                  controller for active queue management
                                  based on $ H_\infty $ control theory . . 750--764
                Jinchang Lu and   
                       Maode Ma   Cross-layer QoS support framework and
                                  holistic opportunistic scheduling for
                                  QoS in single carrier WiMAX system . . . 765--773
                 Li Chunlin and   
                      Li Layuan   Context aware service provisioning in
                                  mobile grid  . . . . . . . . . . . . . . 774--782
               Congduc Pham and   
           Abdallah Makhoul and   
                   Rachid Saadi   Risk-based adaptive scheduling in
                                  randomly deployed video sensor networks
                                  for critical surveillance applications   783--795
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 3, May, 2011

              Quan Z. Sheng and   
           Sherali Zeadally and   
      Aikaterini Mitrokotsa and   
                 Zakaria Maamar   RFID technology, systems, and
                                  applications . . . . . . . . . . . . . . 797--798
                    Wen Yao and   
             Chao-Hsien Chu and   
                        Zang Li   Leveraging complex event processing for
                                  smart hospitals using RFID . . . . . . . 799--810
                  Yi-Wei Ma and   
             Han-Chieh Chao and   
           Jiann-Liang Chen and   
                   Cheng-Yen Wu   Load-balancing mechanism for the RFID
                                  middleware applications over grid
                                  networking . . . . . . . . . . . . . . . 811--820
            Filippo Gandino and   
             Renato Ferrero and   
     Bartolomeo Montrucchio and   
            Maurizio Rebaudengo   Probabilistic DCS: an RFID
                                  reader-to-reader anti-collision protocol 821--832
          Pedro Peris-Lopez and   
             Agustin Orfila and   
  Julio C. Hernandez-Castro and   
        Jan C. A. van der Lubbe   Flaws on RFID grouping-proofs.
                                  Guidelines for future sound protocols    833--845
            Francesco Rizzo and   
           Marcello Barboni and   
            Lorenzo Faggion and   
           Graziano Azzalin and   
                   Marco Sironi   Improved security for commercial
                                  container transports using an innovative
                                  active RFID system . . . . . . . . . . . 846--852
          Roberto Di Pietro and   
                    Refik Molva   An optimal probabilistic solution for
                                  information confinement, privacy, and
                                  security in RFID systems . . . . . . . . 853--863
        M. V. Bueno-Delgado and   
                J. Vales-Alonso   On the optimal frame-length
                                  configuration on real passive RFID
                                  systems  . . . . . . . . . . . . . . . . 864--876
                   G. P. Hancke   Design of a secure distance-bounding
                                  channel for RFID . . . . . . . . . . . . 877--887
               Hanning Chen and   
                Yunlong Zhu and   
                 Kunyuan Hu and   
                         Tao Ku   RFID network planning using a
                                  multi-swarm optimizer  . . . . . . . . . 888--901
     Apostolia Papapostolou and   
                Hakima Chaouchi   RFID-assisted indoor localization and
                                  the impact of interference on its
                                  performance  . . . . . . . . . . . . . . 902--913
               Wei-Shinn Ku and   
               Kazuya Sakai and   
                     Min-Te Sun   The optimal $k$-covering tag deployment
                                  for RFID-based localization  . . . . . . 914--924
     Pilar Manzanares-Lopez and   
Juan Pedro Muñoz-Gea and   
 Josemaria Malgosa-Sanahuja and   
  Juan Carlos Sanchez-Aarnoutse   An efficient distributed discovery
                                  service for EPCglobal network in nested
                                  package scenarios  . . . . . . . . . . . 925--937
               Huanjia Yang and   
                  Lili Yang and   
                Shuang-Hua Yang   Hybrid ZigBee RFID sensor network for
                                  humanitarian logistics centre management 938--948
          Worapot Jakkhupan and   
            Somjit Arch-int and   
                     Yuefeng Li   Business process analysis and simulation
                                  for the RFID and EPCglobal Network
                                  enabled supply chain: a proof-of-concept
                                  approach . . . . . . . . . . . . . . . . 949--957
                 Taewoo Nam and   
                  Keunhyuk Yeom   Business-aware framework for supporting
                                  RFID-enabled applications in EPC Network 958--971
         Leonardo A. Amaral and   
          Fabiano P. Hessel and   
         Eduardo A. Bezerra and   
Jerônimo C. Corrêa and   
           Oliver B. Longhi and   
              Thiago F. O. Dias   eCloudRFID --- a mobile software
                                  framework architecture for pervasive
                                  RFID-based applications  . . . . . . . . 972--979
               Pablo Najera and   
               Javier Lopez and   
                  Rodrigo Roman   Real-time location and inpatient care
                                  systems based on passive RFID  . . . . . 980--989
               Chuong C. Vo and   
         Naveen Chilamkurti and   
               Seng W. Loke and   
                   Torab Torabi   Radio-Mama: an RFID based business
                                  process framework for asset management   990--997
             Maria Chaudhry and   
           Ali Hammad Akbar and   
               Qanita Ahmad and   
                   Imran Sarwar   SOARware$^1$: Treading through the
                                  crossroads of RFID middleware and SOA
                                  paradigm . . . . . . . . . . . . . . . . 998--1014
       Damith C. Ranasinghe and   
              Mark Harrison and   
         Kary Främling and   
               Duncan McFarlane   Enabling through life product-instance
                                  management: Solutions and challenges . . 1015--1031
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 4, July, 2011

                   Keqiu Li and   
           Laurence T. Yang and   
                     Xuemin Lin   Advanced topics in cloud computing . . . 1033--1034
                  Gang Chen and   
                 Yongwei Wu and   
                    Jia Liu and   
              Guangwen Yang and   
                   Weimin Zheng   Optimization of sub-query processing in
                                  distributed data integration systems . . 1035--1042
                    Z. Zhou and   
                 L. T. Yang and   
                   S. Bhiri and   
                     L. Shu and   
                   N. Xiong and   
                   M. Hauswirth   Verifying mediated service interactions
                                  considering expected behaviours  . . . . 1043--1053
                 Yuqing Zhu and   
               Jianmin Wang and   
                   Chaokun Wang   Ripple: a publish/subscribe service for
                                  multidata item updates propagation in
                                  the cloud  . . . . . . . . . . . . . . . 1054--1067
             Xiangzhen Kong and   
                 Chuang Lin and   
                Yixin Jiang and   
                    Wei Yan and   
                    Xiaowen Chu   Efficient dynamic task scheduling in
                                  virtualized data centers with fuzzy
                                  prediction . . . . . . . . . . . . . . . 1068--1077
                Weidong Shi and   
                    Yang Lu and   
                     Zhu Li and   
              Jonathan Engelsma   SHARC: a scalable $3$D graphics virtual
                                  appliance delivery framework in cloud    1078--1087
                    Hai Jin and   
                    Wei Gao and   
                    Song Wu and   
                Xuanhua Shi and   
                 Xiaoxin Wu and   
                       Fan Zhou   Optimizing the live migration of virtual
                                  machine by CPU scheduling  . . . . . . . 1088--1096
              Ashley Chonka and   
                 Yang Xiang and   
                Wanlei Zhou and   
                  Alessio Bonti   Cloud security defence to protect cloud
                                  computing against HTTP-DoS and XML-DoS
                                  attacks  . . . . . . . . . . . . . . . . 1097--1107
               Yanming Shen and   
                   Keqiu Li and   
                 Junfeng Xu and   
                          Lu Li   Layered video multicast with a P2P
                                  cooperation approach . . . . . . . . . . 1108--1112
            Flavio Lombardi and   
              Roberto Di Pietro   Secure virtualization for cloud
                                  computing  . . . . . . . . . . . . . . . 1113--1122
           Fouzi Semchedine and   
Louiza Bouallouche-Medjkoune and   
              Djamil A\"\issani   Task assignment policies in distributed
                                  server systems: a survey . . . . . . . . 1123--1130
               Tien-Ho Chen and   
              Yen-Chiu Chen and   
              Wei-Kuan Shih and   
                   Hsin-Wen Wei   An efficient anonymous authentication
                                  protocol for mobile pay-TV . . . . . . . 1131--1137
                  Jian Wang and   
                Yanheng Liu and   
                        Yu Jiao   Building a trusted route in a mobile ad
                                  hoc network considering communication
                                  reliability and path length  . . . . . . 1138--1149
                      J. Hu and   
                  I. Khalil and   
                     S. Han and   
                     A. Mahmood   Seamless integration of dependability
                                  and security concepts in SOA: a feedback
                                  control system based framework and
                                  taxonomy . . . . . . . . . . . . . . . . 1150--1159
                  Hyun Sung Kim   Location-based authentication protocol
                                  for first cognitive radio networking
                                  standard . . . . . . . . . . . . . . . . 1160--1167
            David G. Rosado and   
Eduardo Fernández-Medina and   
        Javier López and   
                 Mario Piattini   Systematic design of secure Mobile Grid
                                  systems  . . . . . . . . . . . . . . . . 1168--1183
              Fatemeh Amiri and   
MohammadMahdi Rezaei Yousefi and   
                 Caro Lucas and   
             Azadeh Shakery and   
                 Nasser Yazdani   Mutual information-based feature
                                  selection for intrusion detection
                                  systems  . . . . . . . . . . . . . . . . 1184--1199
               Rafael Duque and   
           Crescencio Bravo and   
                  Manuel Ortega   A model-based framework to automate the
                                  analysis of users' activity in
                                  collaborative systems  . . . . . . . . . 1200--1209
                Meirong Liu and   
               Timo Koskela and   
               Zhonghong Ou and   
                Jiehan Zhou and   
               Jukka Riekki and   
                Mika Ylianttila   Super-peer-based coordinated service
                                  provision  . . . . . . . . . . . . . . . 1210--1224
                 Jaime Chen and   
         Manuel Díaz and   
                Luis Llopis and   
     Bartolomé Rubio and   
           José M. Troya   A survey on quality of service support
                                  in wireless sensor and actor networks:
                                  Requirements and challenges in the
                                  context of critical infrastructure
                                  protection . . . . . . . . . . . . . . . 1225--1239
                  Mahmut Tenruh   Message scheduling with reduced matrix
                                  cycle and evenly distributed sparse
                                  allocation for time-triggered CAN  . . . 1240--1251
        Sheikh Tahir Bakhsh and   
           Halabi Hasbullah and   
                   Sabeen Tahir   Dynamic Congestion Control through
                                  backup relay in Bluetooth scatternet . . 1252--1262
                Xingwei Liu and   
                Xuming Fang and   
                    Xu Chen and   
                   Xuesong Peng   A bidding model and cooperative
                                  game-based vertical handoff decision
                                  algorithm  . . . . . . . . . . . . . . . 1263--1271
                      Qi Lu and   
                       Maode Ma   Group mobility support in mobile WiMAX
                                  networks . . . . . . . . . . . . . . . . 1272--1282
Jesús Ibáñez   Minimalist approach to show emotions via
                                  a flock of smileys . . . . . . . . . . . 1283--1291
            Chun-Ying Huang and   
               Shang-Pin Ma and   
                   Kuan-Ta Chen   Using one-time passwords to prevent
                                  password phishing attacks  . . . . . . . 1292--1301
                   Miao Xie and   
                   Song Han and   
                Biming Tian and   
                   Sazia Parvin   Anomaly detection in wireless sensor
                                  networks: a survey . . . . . . . . . . . 1302--1325
                Sinan Senol and   
        Kemal Leblebicioglu and   
                 Ece G. Schmidt   INtERCEDE: an algorithmic approach to
                                  networked control system design  . . . . 1326--1341
       Rafael Teigão and   
             Carlos Maziero and   
                  Altair Santin   Applying a usage control model in an
                                  operating system kernel  . . . . . . . . 1342--1352
                Songtao Guo and   
             Chuangyin Dang and   
                  Xiaofeng Liao   Joint opportunistic power and rate
                                  allocation for wireless ad hoc networks:
                                  an adaptive particle swarm optimization
                                  approach . . . . . . . . . . . . . . . . 1353--1365
                Justin Dean and   
            Andrew Harrison and   
             Robert N. Lass and   
                 Joe Macker and   
               David Millar and   
                     Ian Taylor   Client/server messaging protocols in
                                  serverless environments  . . . . . . . . 1366--1379
                 Y. Challal and   
               A. Ouadjaout and   
                   N. Lasla and   
                   M. Bagaa and   
                     A. Hadjidj   Secure and efficient disjoint multipath
                                  construction for fault tolerant routing
                                  in wireless sensor networks  . . . . . . 1380--1397
                 Wenfeng Li and   
                   Weiming Shen   Swarm behavior control of mobile
                                  multi-robots with wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1398--1407
                    R. O. Ocaya   A framework for collaborative remote
                                  experimentation for a physical
                                  laboratory using a low cost embedded web
                                  server . . . . . . . . . . . . . . . . . 1408--1415
                  Wenjun Xu and   
                  Zude Zhou and   
                 D. T. Pham and   
                      C. Ji and   
                    M. Yang and   
                       Quan Liu   Hybrid congestion control for high-speed
                                  networks . . . . . . . . . . . . . . . . 1416--1428
    Javad Akbari Torkestani and   
          Mohammad Reza Meybodi   A link stability-based multicast routing
                                  protocol for wireless mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1429--1440
André Vicente Calvinho and   
             Rui Gustavo Crespo   Email FI identification and resolution
                                  with model checking  . . . . . . . . . . 1441--1446
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 5, September, 2011

             Han-Chieh Chao and   
        Jean-Pierre Seifert and   
                Shiguo Lian and   
                     Liang Zhou   Dependable multimedia communications:
                                  Systems, services, and applications  . . 1447--1448
                     Rongbo Zhu   Intelligent rate control for supporting
                                  real-time traffic in WLAN mesh networks  1449--1458
                 Po-Yi Shih and   
               Po-Chuan Lin and   
              Jhing-Fa Wang and   
                  Yuan-Ning Lin   Robust several-speaker speech
                                  recognition with highly dependable
                                  online speaker adaptation and
                                  identification . . . . . . . . . . . . . 1459--1467
                 Der-Jiunn Deng   PSSB: Priority enforced slow-start
                                  backoff algorithm for multimedia
                                  transmission in wireless ad-hoc networks 1468--1473
              Philip Leroux and   
        Steven Latré and   
           Nicolas Staelens and   
             Piet Demeester and   
                 Filip De Turck   Mobile TV services through IP Datacast
                                  over DVB-H: Dependability of the quality
                                  of experience on the IP-based
                                  distribution network quality of service  1474--1488
                     Wen Ji and   
                   Min Chen and   
                  Xiaohu Ge and   
                    Peng Li and   
                   Yiqiang Chen   A perceptual macroblock layer power
                                  control for energy scalable video
                                  encoder based on just noticeable
                                  distortion principle . . . . . . . . . . 1489--1497
       Sanjay K. Dhurandher and   
                Sudip Misra and   
              Puneet Pruthi and   
            Shubham Singhal and   
           Saurabh Aggarwal and   
                 Isaac Woungang   Using bee algorithm for peer-to-peer
                                  file searching in mobile ad hoc networks 1498--1508
                 I.-Ju Liao and   
                  Tin-Yu Wu and   
               Jen-Wen Ding and   
                  Wei-Tsong Lee   A novel $3$D streaming protocol
                                  supported multi-mode display . . . . . . 1509--1517
             Rashid Mehmood and   
               Raad Alturki and   
               Sherali Zeadally   Multimedia applications over
                                  metropolitan area networks (MANs)  . . . 1518--1529
                Sudip Misra and   
                     Ankur Jain   Policy controlled self-configuration in
                                  unattended wireless sensor networks  . . 1530--1544
              Chia-Hui Wang and   
                    Yu-Shun Liu   A dependable privacy protection for
                                  end-to-end VoIP via Elliptic-Curve
                                  Diffie--Hellman and dynamic key changes  1545--1556
               Guangjie Liu and   
                Junwen Wang and   
                Shiguo Lian and   
                   Zhiquan Wang   A passive image authentication scheme
                                  for detecting region-duplication forgery
                                  with rotation  . . . . . . . . . . . . . 1557--1565
           Yeong-Sheng Chen and   
               Yuan-Wei Lee and   
                 Jong Hyuk Park   Enhanced HCCA mechanism for multimedia
                                  traffics with QoS support in IEEE
                                  802.11e networks . . . . . . . . . . . . 1566--1571
                Kevin J. Ma and   
               Radim Bartos and   
                 Swapnil Bhatia   A survey of schemes for Internet-based
                                  video delivery . . . . . . . . . . . . . 1572--1586
             Neyre Tekbiyik and   
           Elif Uysal-Biyikoglu   Energy efficient wireless unicast
                                  routing alternatives for
                                  machine-to-machine networks  . . . . . . 1587--1614
              Ching-Hao Mao and   
              Hahn-Ming Lee and   
                     Che-Fu Yeh   Adaptive e-mails intention finding
                                  system based on words social networks    1615--1622
                   Jun Yang and   
                    Bin Dai and   
             Benxiong Huang and   
                        Shui Yu   Orthogonal feedback scheme for network
                                  coding . . . . . . . . . . . . . . . . . 1623--1633
Jordán Pascual Espada and   
Oscar Sanjuán Martínez and   
  Juan Manuel Cueva Lovelle and   
B. Cristina Pelayo G-Bustelo and   
Manuel Álvarez Álvarez and   
Alejandro González García   Modeling architecture for collaborative
                                  virtual objects based on services  . . . 1634--1647
                  Ting Chen and   
            Xiao-song Zhang and   
                     Hua Li and   
                Xiong-da Li and   
                         Yue Wu   Fast quarantining of proactive worms in
                                  unstructured P2P networks  . . . . . . . 1648--1659
     Anindya Tahsin Prodhan and   
               Rajkumar Das and   
              Humayun Kabir and   
             Gholamali C. Shoja   TTL based routing in opportunistic
                                  networks . . . . . . . . . . . . . . . . 1660--1670
                Imad Jawhar and   
              Nader Mohamed and   
              Dharma P. Agrawal   Linear wireless sensor networks:
                                  Classification and applications  . . . . 1671--1682
           Stenio Fernandes and   
              Judith Kelner and   
                   Djamel Sadok   An adaptive-predictive architecture for
                                  video streaming servers  . . . . . . . . 1683--1694
              Liqiang Zhang and   
               Yu-Jen Cheng and   
                    Xiaobo Zhou   Enhanced statistics-based rate
                                  adaptation for 802.11 wireless networks  1695--1706
         Martin Kuehnhausen and   
                Victor S. Frost   Application of the Java Message Service
                                  in mobile monitoring environments  . . . 1707--1716
                  Zac Sadan and   
              David G. Schwartz   Social network analysis of web links to
                                  eliminate false positives in
                                  collaborative anti-spam systems  . . . . 1717--1723
             Chien-Lung Hsu and   
                     Han-Yu Lin   New identity-based key-insulated
                                  convertible multi-authenticated
                                  encryption scheme  . . . . . . . . . . . 1724--1731
                    Tao Qin and   
              Xiaohong Guan and   
                     Wei Li and   
               Pinghui Wang and   
                  Qiuzhen Huang   Monitoring abnormal network traffic
                                  based on blind source separation
                                  approach . . . . . . . . . . . . . . . . 1732--1742
                Hwa-Chun Ma and   
         Prasan Kumar Sahoo and   
                   Yen-Wen Chen   Computational geometry based distributed
                                  coverage hole detection protocol for the
                                  wireless sensor networks . . . . . . . . 1743--1756
                 Wenjia Niu and   
                    Gang Li and   
                   Hui Tang and   
                    Xu Zhou and   
                   Zhongzhi Shi   CARSA: a context-aware reasoning-based
                                  service agent model for AI planning of
                                  web service composition  . . . . . . . . 1757--1770
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 6, November, 2011

                Jiming Chen and   
                David K. Y. Yau   Control and optimization over wireless
                                  networks . . . . . . . . . . . . . . . . 1771--1772
                  Ning Weng and   
                  I-Hung Li and   
                    Lucas Vespa   Information quality model and
                                  optimization for 802.15.4-based wireless
                                  sensor networks  . . . . . . . . . . . . 1773--1783
                Rabun Kosar and   
              Ilir Bojaxhiu and   
                 Ertan Onur and   
                      Cem Ersoy   Lifetime extension for surveillance
                                  wireless sensor networks with
                                  intelligent redeployment . . . . . . . . 1784--1793
              Wahabou Abdou and   
             Adrien Henriet and   
           Christelle Bloch and   
         Dominique Dhoutaut and   
             Damien Charlet and   
          François Spies   Using an evolutionary algorithm to
                                  optimize the broadcasting methods in
                                  mobile ad hoc networks . . . . . . . . . 1794--1804
             Dang Tu Nguyen and   
                  Wook Choi and   
              Minh Thiep Ha and   
                 Hyunseung Choo   Design and analysis of a multi-candidate
                                  selection scheme for greedy routing in
                                  wireless sensor networks . . . . . . . . 1805--1817
                 Wenjia Liu and   
                        Bo Chen   Optimal control of mobile monitoring
                                  agents in immune-inspired wireless
                                  monitoring networks  . . . . . . . . . . 1818--1826
                  Qing Chen and   
       Zubair Md. Fadlullah and   
               Xiaodong Lin and   
                       Nei Kato   A clique-based secure admission control
                                  scheme for mobile ad hoc networks
                                  (MANETs) . . . . . . . . . . . . . . . . 1827--1835
          Bader Al-Manthari and   
               Nidal Nasser and   
              Najah Abu Ali and   
               Hossam Hassanein   Congestion prevention in broadband
                                  wireless access systems: an economic
                                  approach . . . . . . . . . . . . . . . . 1836--1847
                Jihoon Ryoo and   
                   Hwangnam Kim   Multi-sector multi-range control for
                                  self-organizing wireless networks  . . . 1848--1860
                Zhaoming Lu and   
                   Yan Yang and   
              Xiangming Wen and   
                    Ying Ju and   
                      Wei Zheng   A cross-layer resource allocation scheme
                                  for ICIC in LTE-Advanced . . . . . . . . 1861--1868
              M. Jahanshahi and   
                 M. Dehghan and   
                  M. R. Meybodi   A mathematical formulation for joint
                                  channel assignment and multicast routing
                                  in multi-channel multi-radio wireless
                                  mesh networks  . . . . . . . . . . . . . 1869--1882
Juan Rodríguez-Covili and   
            Sergio F. Ochoa and   
        José A. Pino and   
              Roc Messeguer and   
              Esunly Medina and   
                    Dolors Royo   A communication infrastructure to ease
                                  the development of mobile collaborative
                                  applications . . . . . . . . . . . . . . 1883--1893
                     Bin Li and   
                 Zheng Zhou and   
                  Dejian Li and   
                     Weixia Zou   A novel Parzen probabilistic neural
                                  network based noncoherent detection
                                  algorithm for distributed ultra-wideband
                                  sensors  . . . . . . . . . . . . . . . . 1894--1902
                 Kyusuk Han and   
              Youngjoon Seo and   
              Sungjune Yoon and   
  James J. (Jong Hyuk) Park and   
                   Taeshik Shon   Providing security vertical handoff in
                                  SARAH for heterogeneous networks . . . . 1903--1907
              Muhammad Ayaz and   
                 Imran Baig and   
            Azween Abdullah and   
                  Ibrahima Faye   A survey on routing techniques in
                                  underwater wireless sensor networks  . . 1908--1927
       Sarogini Grace Pease and   
                   Lin Guan and   
              Iain Phillips and   
                     Alan Grigg   Cross-layer signalling and middleware: a
                                  survey for inelastic soft real-time
                                  applications in MANETs . . . . . . . . . 1928--1941
       David Antolino Rivas and   
José M. Barceló-Ordinas and   
      Manel Guerrero Zapata and   
  Julián D. Morillo-Pozo   Security on VANETs: Privacy, misbehaving
                                  nodes, false information and secure data
                                  aggregation  . . . . . . . . . . . . . . 1942--1955
       Muhammad Azhar Iqbal and   
                    Bin Dai and   
             Benxiong Huang and   
                  A. Hassan and   
                        Shui Yu   Survey of network coding-aware routing
                                  protocols in wireless networks . . . . . 1956--1970
                M. Bakhouya and   
                   J. Gaber and   
                      P. Lorenz   An adaptive approach for information
                                  dissemination in Vehicular Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 1971--1978
                    Lu Leng and   
                   Jiashu Zhang   Dual-key-binding cancelable palmprint
                                  cryptosystem for palmprint protection
                                  and information security . . . . . . . . 1979--1989
           Jeremiah D. Deng and   
               Martin K. Purvis   Multi-core application performance
                                  optimization using a constrained tandem
                                  queueing model . . . . . . . . . . . . . 1990--1996
          Pedro M. Wightman and   
             Miguel A. Labrador   A family of simple distributed minimum
                                  connected dominating set-based topology
                                  construction algorithms  . . . . . . . . 1997--2010
       Sanjay Kumar Biswash and   
               Chiranjeev Kumar   An efficient metric-based (EM-B)
                                  location management scheme for wireless
                                  cellular networks  . . . . . . . . . . . 2011--2026
              Tzu-Chi Huang and   
                   Kuo-Chih Chu   Networking without Dynamic Host
                                  Configuration Protocol server in
                                  Ethernet and Wireless Local Area Network 2027--2041
      Maziar Ahmad Sharbafi and   
     Mohammad Javad Yazdanpanah   IDFC: a new approach to control
                                  bifurcation in TCP/RED . . . . . . . . . 2042--2050
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 35, Number 1, January, 2012

                      Anonymous   Contents list continued  . . . . . . . . II
               Weiming Shen and   
                Yinsheng Li and   
                     Anne James   Collaborative computing and applications 1--2
               Hugo Paredes and   
               F. Mario Martins   Social interaction regulation in virtual
                                  web environments using the Social
                                  Theatres model . . . . . . . . . . . . . 3--19
              Weizhan Zhang and   
              Qinghua Zheng and   
                  Haifei Li and   
                      Feng Tian   An overlay multicast protocol for live
                                  streaming and delay-guaranteed
                                  interactive media  . . . . . . . . . . . 20--28
                    Min Liu and   
                  Shijun Xu and   
                       Siyi Sun   An agent-assisted QoS-based routing
                                  algorithm for wireless sensor networks   29--36
       Tossaporn Srisooksai and   
          Kamol Keamarungsi and   
         Poonlap Lamsrichan and   
                Kiyomichi Araki   Practical data compression in wireless
                                  sensor networks: a survey  . . . . . . . 37--59
                Junzhou Luo and   
              Xiaogang Wang and   
                      Ming Yang   An interval centroid based spread
                                  spectrum watermarking scheme for
                                  multi-flow traceback . . . . . . . . . . 60--71
               Kyuyong Shin and   
              Douglas S. Reeves   Winnowing: Protecting P2P systems
                                  against pollution through cooperative
                                  index filtering  . . . . . . . . . . . . 72--84
               Guoqiang Gao and   
                 Ruixuan Li and   
                 Kunmei Wen and   
                        Xiwu Gu   Proactive replication for rare objects
                                  in unstructured peer-to-peer networks    85--96
                  Kwanghoon Kim   A model-driven workflow fragmentation
                                  framework for collaborative workflow
                                  architectures and systems  . . . . . . . 97--110
                 Junpeng Du and   
                Shikai Jing and   
                     Jihong Liu   Creating shared design thinking process
                                  for collaborative design . . . . . . . . 111--120
                Yunjiao Xue and   
         Hamada H. Ghenniwa and   
                   Weiming Shen   Frame-based ontological view for
                                  semantic integration . . . . . . . . . . 121--131
                 Hongbo Sun and   
                 Wenhui Fan and   
               Weiming Shen and   
                  Tianyuan Xiao   Ontology-based interoperation model of
                                  collaborative product development  . . . 132--144
Juan Rodríguez-Covili and   
            Sergio F. Ochoa and   
            José A. Pino   High level MANET protocol: Enhancing the
                                  communication support for mobile
                                  collaborative work . . . . . . . . . . . 145--155
                 Yuqing Sun and   
         Dickson K. W. Chiu and   
                   Bin Gong and   
               Xiangxu Meng and   
                     Peng Zhang   Scheduling mobile collaborating
                                  workforce for multiple urgent events . . 156--163
  Fabrício Enembreck and   
Jean-Paul André Barth\`es   Distributed constraint optimization with
                                  MULBS: a case study on collaborative
                                  meeting scheduling . . . . . . . . . . . 164--175
Mar Pérez-Sanagustín and   
   Gustavo Ramirez-Gonzalez and   
Davinia Hernández-Leo and   
Mario Muñoz-Organero and   
            Patricia Santos and   
                 Josep Blat and   
           Carlos Delgado Kloos   Discovering the campus together: a
                                  mobile and computer-based learning
                                  experience . . . . . . . . . . . . . . . 176--188
        Adriana S. Vivacqua and   
            Marcos R. S. Borges   Taking advantage of collective knowledge
                                  in emergency response systems  . . . . . 189--198
          Amir Talaei-Khoei and   
                Pradeep Ray and   
       Nandan Parameshwaran and   
                    Lundy Lewis   A framework for awareness maintenance    199--210
         Jameela Al-Jaroodi and   
                  Nader Mohamed   Service-oriented middleware: a survey    211--220
     Rajashekhar C. Biradar and   
            Sunilkumar S. Manvi   Review of multicast routing mechanisms
                                  in mobile ad hoc networks  . . . . . . . 221--239
                Xianhui Che and   
                       Barry Ip   Packet-level traffic analysis of online
                                  games from the genre characteristics
                                  perspective  . . . . . . . . . . . . . . 240--252
          Kok-Lim Alvin Yau and   
          Peter Komisarczuk and   
                   Paul D. Teal   Reinforcement learning for context
                                  awareness and intelligence in wireless
                                  networks: Review, new features and open
                                  issues . . . . . . . . . . . . . . . . . 253--267
               Mawloud Omar and   
             Yacine Challal and   
        Abdelmadjid Bouabdallah   Certification-based trust models in
                                  mobile ad hoc networks: a survey and
                                  taxonomy . . . . . . . . . . . . . . . . 268--286
       Eleftherios Stergiou and   
               John Garofalakis   Performance estimation of banyan semi
                                  layer networks with drop resolution
                                  mechanism  . . . . . . . . . . . . . . . 287--294
           Ibrahim Al-Surmi and   
             Mohamed Othman and   
           Borhanuddin Mohd Ali   Mobility management for IP-based next
                                  generation mobile networks: Review,
                                  challenge and perspective  . . . . . . . 295--315
                 Feng Zhong and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Adaptive load balancing algorithm for
                                  multiple homing mobile nodes . . . . . . 316--327
       Marinho P. Barcellos and   
         Rodolfo S. Antunes and   
         Hisham H. Muhammad and   
          Ruthiano S. Munaretti   Beyond network simulators: Fostering
                                  novel distributed applications and
                                  protocols through extendible design  . . 328--339
                   Fagen Li and   
      Muhammad Khurram Khan and   
          Khaled Alghathbar and   
                Tsuyoshi Takagi   Identity-based online/offline
                                  signcryption for low power devices . . . 340--347
                 Walid Saad and   
                 Zaher Dawy and   
             Sanaa Sharafeddine   A utility-based algorithm for joint
                                  uplink/downlink scheduling in wireless
                                  cellular networks  . . . . . . . . . . . 348--356
                       Jing Nie   IPv6 based relay gateway protocol in
                                  hybrid networks  . . . . . . . . . . . . 357--364
          Dhiah Al-Shammary and   
                 Ibrahim Khalil   Redundancy-aware SOAP messages
                                  compression and aggregation for enhanced
                                  performance  . . . . . . . . . . . . . . 365--381
      Eduardo Cañete and   
                 Jaime Chen and   
            R. Marcos Luque and   
         Bartolomé Rubio   NeuralSens: a neural network based
                                  framework to allow dynamic adaptation in
                                  wireless sensor and actor networks . . . 382--393
     Mohammad Javad Rostami and   
Azadeh Alsadat Emrani Zarandi and   
     Seyed Mohamad Hoseininasab   MSDP with ACO: a maximal SRLG disjoint
                                  routing algorithm based on ant colony
                                  optimization . . . . . . . . . . . . . . 394--402
            Ronald Beaubrun and   
      Jhon-Fredy Llano-Ruiz and   
             Benoit Poirier and   
             Alejandro Quintero   A middleware architecture for
                                  disseminating delay-constrained
                                  information in wireless sensor networks  403--411
    Jasma Balasangameshwara and   
             Nedunchezhian Raju   A hybrid policy for fault tolerant load
                                  balancing in grid computing environments 412--422
                  Tzu-Chi Huang   Program Ultra-Dispatcher for launching
                                  applications in a customization manner
                                  on cloud computing . . . . . . . . . . . 423--446
                Chao-Tsun Chang   Hash caching mechanism in source-based
                                  routing for wireless ad hoc networks . . 447--458
                Sajjad Zare and   
       Akbar Ghaffarpour Rahbar   An FEC scheme combined with weighted
                                  scheduling to reduce multicast packet
                                  loss in IPTV over PON  . . . . . . . . . 459--468
                  Jun Huang and   
             Xiaohong Huang and   
                         Yan Ma   Routing with multiple
                                  quality-of-services constraints: an
                                  approximation perspective  . . . . . . . 469--479
             Serif Bahtiyar and   
    Mehmet Ufuk Çaglayan   Extracting trust information from
                                  security system of a service . . . . . . 480--490
               Jorge Blasco and   
Julio Cesar Hernandez-Castro and   
José María de Fuentes and   
          Benjamín Ramos   A framework for avoiding steganography
                                  usage over HTTP  . . . . . . . . . . . . 491--501
                    Bing Hu and   
              Kwan L. Yeung and   
                 Zhaoyang Zhang   Load-balanced three-stage switch . . . . 502--509
           Ioannis Krikidis and   
               John S. Thompson   MIMO two-way relay channel with
                                  superposition coding and imperfect
                                  channel estimation . . . . . . . . . . . 510--516
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 2, March, 2012

           Mesut Günes and   
                      Yan Zhang   In memory of Mieso Denko . . . . . . . . 517
              Ming-Tuo Zhou and   
                 Hiroshi Harada   Cognitive maritime wireless mesh/ad hoc
                                  networks . . . . . . . . . . . . . . . . 518--526
       Theofanis P. Lambrou and   
         Christos G. Panayiotou   A testbed for coverage control using
                                  mixed wireless sensor networks . . . . . 527--537
            Joachim Fischer and   
         Jens-Peter Redlich and   
              Jochen Zschau and   
            Claus Milkereit and   
             Matteo Picozzi and   
              Kevin Fleming and   
            Mihal Brumbulli and   
       Björn Lichtblau and   
                Ingmar Eveslage   A wireless mesh sensing network for
                                  early warning  . . . . . . . . . . . . . 538--547
      Evangelos Theodoridis and   
    Ioannis Chatzigiannakis and   
                  Stefan Dulman   Post-processing in wireless sensor
                                  networks: Benchmarking sensor trace
                                  files for in-network data aggregation    548--561
       Iván Corredor and   
José F. Martínez and   
         Miguel S. Familiar and   
           Lourdes López   Knowledge-Aware and Service-Oriented
                                  Middleware for deploying pervasive
                                  services . . . . . . . . . . . . . . . . 562--576
                    Bo Yang and   
             Manohar Mareboyana   Similarity search in sensor networks
                                  using semantic-based caching . . . . . . 577--583
            Mari Carmen Domingo   An overview of the Internet of Things
                                  for people with disabilities . . . . . . 584--596
               Sajjad Rizvi and   
     Hassaan Khaliq Qureshi and   
            Syed Ali Khayam and   
          Veselin Rakocevic and   
        Muttukrishnan Rajarajan   A1: an energy efficient topology control
                                  algorithm for connected area coverage in
                                  wireless sensor networks . . . . . . . . 597--605
          Malabika Sengupta and   
        Swapan Kumar Mondal and   
                  Debashis Saha   A comparison of wavelength reservation
                                  protocols for WDM optical networks . . . 606--618
                  Chuan Zhu and   
              Chunlin Zheng and   
                    Lei Shu and   
                   Guangjie Han   A survey on coverage and connectivity
                                  issues in wireless sensor networks . . . 619--632
                Jingyu Wang and   
               Jianxin Liao and   
                    Tonghong Li   OSIA: Out-of-order Scheduling for
                                  In-order Arriving in concurrent
                                  multi-path transfer  . . . . . . . . . . 633--643
         Sanaa Sharafeddine and   
          Ibrahim Al-Kassem and   
                     Zaher Dawy   A scatternet formation algorithm for
                                  Bluetooth networks with a non-uniform
                                  distribution of devices  . . . . . . . . 644--656
               Wenjie Zhang and   
                  Chai Kiat Yeo   Throughput and delay scaling laws for
                                  mobile overlaid wireless networks  . . . 657--667
                Hoda Hassan and   
             Mohamed Eltoweissy   CORM: a reference model for future
                                  computer networks  . . . . . . . . . . . 668--680
           Nicola Cordeschi and   
          Tatiana Patriarca and   
                Enzo Baccarelli   Stochastic traffic engineering for
                                  real-time applications over wireless
                                  networks . . . . . . . . . . . . . . . . 681--694
           Francisco Jurado and   
          Miguel A. Redondo and   
                  Manuel Ortega   Using fuzzy logic applied to software
                                  metrics and test cases to assess
                                  programming assignments and give advice  695--712
              Golnaz Vakili and   
              Siavash Khorsandi   Coordination of cooperation policies in
                                  a peer-to-peer system using swarm-based
                                  RL . . . . . . . . . . . . . . . . . . . 713--722
               Radim Burget and   
                Dan Komosny and   
           Kathiravelu Ganeshan   Topology aware feedback transmission for
                                  real-time control protocol . . . . . . . 723--730
       Mahboobeh Sedighizad and   
                Babak Seyfe and   
                  Keivan Navaie   MR-BART: Multi-Rate Available Bandwidth
                                  Estimation in Real-Time  . . . . . . . . 731--742
                 Yi-hua Zhu and   
                     Hui Xu and   
                Kai-kai Chi and   
                         Hua Hu   Accumulating error-free frame blocks to
                                  improve throughput for IEEE 802.11-based
                                  WLAN . . . . . . . . . . . . . . . . . . 743--752
         Carlos T. Calafate and   
          Giancarlo Fortino and   
             Sascha Fritsch and   
             Janio Monteiro and   
           Juan-Carlos Cano and   
                 Pietro Manzoni   An efficient and robust content delivery
                                  solution for IEEE 802.11p vehicular
                                  environments . . . . . . . . . . . . . . 753--762
                   Xiong Li and   
             Yongping Xiong and   
                    Jian Ma and   
                   Wendong Wang   An efficient and security dynamic
                                  identity based authentication protocol
                                  for multi-server architecture using
                                  smart cards  . . . . . . . . . . . . . . 763--769
              Min-Feng Wang and   
             Meng-Feng Tsai and   
             Sie-Long Jheng and   
               Cheng-Hsien Tang   Social feature-based enterprise email
                                  classification without examining email
                                  contents . . . . . . . . . . . . . . . . 770--777
              Waltenegus Dargie   A medium access control protocol that
                                  supports a seamless handover in wireless
                                  sensor networks  . . . . . . . . . . . . 778--786
        Rajesh Karunamurthy and   
             Ferhat Khendek and   
                 Roch H. Glitho   A novel architecture for Web service
                                  composition  . . . . . . . . . . . . . . 787--802
       Georgios Kastaniotis and   
              Elias Maragos and   
        Christos Douligeris and   
           Dimitris K. Despotis   Using data envelopment analysis to
                                  evaluate the efficiency of web caching
                                  object replacement strategies  . . . . . 803--817
               Wen-Hwa Liao and   
                 Hung-Chun Yang   A power-saving data storage scheme for
                                  wireless sensor networks . . . . . . . . 818--825
              Gildas Avoine and   
             Xavier Carpent and   
                Benjamin Martin   Privacy-friendly synchronized
                                  ultralightweight authentication
                                  protocols in the storm . . . . . . . . . 826--843
             Muhammad Imran and   
             Mohamed Younis and   
               Abas Md Said and   
               Halabi Hasbullah   Localized motion-based connectivity
                                  restoration algorithms for wireless
                                  sensor and actor networks  . . . . . . . 844--856
         Mohit P. Tahiliani and   
                 K. C. Shet and   
               T. G. Basavaraju   CARED: Cautious Adaptive RED gateways
                                  for TCP/IP networks  . . . . . . . . . . 857--864
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 3, May, 2012

           Laurence T. Yang and   
                    Guojun Wang   Special issue on trusted computing and
                                  communications . . . . . . . . . . . . . 865--866
                   Yanli Yu and   
                   Keqiu Li and   
                Wanlei Zhou and   
                        Ping Li   Trust mechanisms in wireless sensor
                                  networks: Attack analysis and
                                  countermeasures  . . . . . . . . . . . . 867--880
                  Lei Jiang and   
                 Lixin Ding and   
                Jianxun Liu and   
                    Jinjun Chen   Reputation rating modeling for open
                                  environment lack of communication by
                                  using online social cognition  . . . . . 881--891
             Weizhong Qiang and   
     Aleksandr Konstantinov and   
                 Deqing Zou and   
               Laurence T. Yang   A standards-based interoperable single
                                  sign-on framework in ARC Grid middleware 892--904
              Zhongtian Jia and   
               Xiaodong Lin and   
               Seng-Hua Tan and   
                 Lixiang Li and   
                    Yixian Yang   Public key distribution scheme for delay
                                  tolerant networks based on two-channel
                                  cryptography . . . . . . . . . . . . . . 905--913
                   Fei Wang and   
                Furong Wang and   
             Benxiong Huang and   
               Laurence T. Yang   SONR: a reliable reputation system of
                                  self-organized network . . . . . . . . . 914--926
                    Qin Liu and   
                Guojun Wang and   
                         Jie Wu   Secure and privacy preserving keyword
                                  searching for cloud storage services . . 927--933
Félix Gómez Mármol and   
Gregorio Martínez Pérez   TRIP, a trust and reputation
                                  infrastructure-based proposal for
                                  vehicular ad hoc networks  . . . . . . . 934--941
      Mohammad-Amin Kharraz and   
         Hamid Sarbazi-Azad and   
               Albert Y. Zomaya   On-demand multicast routing protocol
                                  with efficient route discovery . . . . . 942--950
                Huanyu Zhao and   
                   Xin Yang and   
                     Xiaolin Li   An incentive mechanism to reinforce
                                  truthful reports in reputation systems   951--961
               Laiping Zhao and   
                  Yizhi Ren and   
                 Mingchu Li and   
                Kouichi Sakurai   Flexible service selection with
                                  user-specific QoS support in
                                  service-oriented architecture  . . . . . 962--973
                   Liang Gu and   
              Guangdong Bai and   
                    Yao Guo and   
              Xiangqun Chen and   
                       Hong Mei   Security model oriented attestation on
                                  dynamically reconfigurable
                                  component-based systems  . . . . . . . . 974--981
                   Min Choi and   
             Jong Hyuk Park and   
                Seungho Lim and   
                Young-Sik Jeong   Achieving reliable system performance by
                                  fast recovery of branch miss prediction  982--991
                    Yu Wang and   
                 Yang Xiang and   
                Wanlei Zhou and   
                   Shunzheng Yu   Generating regular expression signatures
                                  for network traffic classification in
                                  trusted network management . . . . . . . 992--1000
                Jin-Hee Cho and   
            Ananthram Swami and   
                   Ing-Ray Chen   Modeling and analysis of trust
                                  management with trust chain optimization
                                  in mobile ad hoc networks  . . . . . . . 1001--1012
             Ousmane Diallo and   
    Joel J. P. C. Rodrigues and   
                     Mbaye Sene   Real-time data management on wireless
                                  sensor networks: a survey  . . . . . . . 1013--1021
                Wen Tao Zhu and   
              Jianying Zhou and   
             Robert H. Deng and   
                       Feng Bao   Detecting node replication attacks in
                                  wireless sensor networks: a survey . . . 1022--1034
                  Jihao Yin and   
                 Yifei Wang and   
                     Jiankun Hu   Free Search with Adaptive Differential
                                  Evolution Exploitation and
                                  Quantum-Inspired Exploration . . . . . . 1035--1051
                  Panho Lee and   
        Anura P. Jayasumana and   
     H. M. N. Dilum Bandara and   
                Sanghun Lim and   
                V. Chandrasekar   A peer-to-peer collaboration framework
                                  for multi-sensor data fusion . . . . . . 1052--1066
              Chao-Yang Lee and   
               Shou-Jen Lin and   
               Chen-Wei Lee and   
                  Chu-Sing Yang   An efficient continuous tracking system
                                  in real-time surveillance application    1067--1073
     Rajashekhar C. Biradar and   
            Sunilkumar S. Manvi   Neighbor supported reliable multipath
                                  multicast routing in MANETs  . . . . . . 1074--1085
      Jesús Gallardo and   
           Crescencio Bravo and   
              Miguel A. Redondo   A model-driven development method for
                                  collaborative modeling tools . . . . . . 1086--1105
             S. Suraprasert and   
              J. Fakcharoenphol   Comparison of recovery schemes to
                                  maximize restorable throughput in
                                  multicast networks . . . . . . . . . . . 1106--1115
Bettahally N. Keshavamurthy and   
            Durga Toshniwal and   
              Bhavani K. Eshwar   Hiding co-occurring prioritized
                                  sensitive patterns over distributed
                                  progressive sequential data streams  . . 1116--1129
      Abderrahmane Baadache and   
                   Ali Belmehdi   Fighting against packet dropping
                                  misbehavior in multi-hop wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1130--1139
           M. C. Batistatos and   
              G. V. Tsoulos and   
             G. E. Athanasiadou   Mobile telemedicine for moving vehicle
                                  scenarios: Wireless technology options
                                  and challenges . . . . . . . . . . . . . 1140--1150
                 Zubair A. Baig   Multi-agent systems for protecting
                                  critical infrastructures: a survey . . . 1151--1161
             Abhik Banerjee and   
             Chuan Heng Foh and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Performance improvements for
                                  network-wide broadcast with
                                  instantaneous network information  . . . 1162--1174
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 4, July, 2012

              Alfredo Cuzzocrea   Intelligent algorithms for data-centric
                                  sensor networks  . . . . . . . . . . . . 1175--1176
          Aris Papadopoulos and   
            Alfredo Navarra and   
            Julie A. McCann and   
            Cristina M. Pinotti   VIBE: an energy efficient routing
                                  protocol for dense and mobile sensor
                                  networks . . . . . . . . . . . . . . . . 1177--1190
              Mark Roantree and   
                    Jie Shi and   
           Paolo Cappellari and   
         Martin F. O'Connor and   
             Michael Whelan and   
                    Niall Moyna   Data transformation and query management
                                  in personal health sensor networks . . . 1191--1202
           Paolo Bellavista and   
           Giuseppe Cardone and   
            Antonio Corradi and   
                  Luca Foschini   The Future Internet convergence of IMS
                                  and ubiquitous smart environments: an
                                  IMS-based solution for energy efficiency 1203--1209
          Alfredo Cuzzocrea and   
       Alexis Papadimitriou and   
         Dimitrios Katsaros and   
            Yannis Manolopoulos   Edge betweenness centrality: a novel
                                  algorithm for QoS-based topology control
                                  over wireless sensor networks  . . . . . 1210--1217
              Gianluca Moro and   
                 Gabriele Monti   W-Grid: a scalable and efficient
                                  self-organizing infrastructure for
                                  multi-dimensional data management,
                                  querying and routing in wireless
                                  data-centric sensor networks . . . . . . 1218--1234
             R. Madhusudhan and   
                   R. C. Mittal   Dynamic ID-based remote user password
                                  authentication schemes using smart
                                  cards: a review  . . . . . . . . . . . . 1235--1248
             Jan von Mulert and   
                  Ian Welch and   
             Winston K. G. Seah   Security threats and solutions in
                                  MANETs: a case study using AODV and
                                  SAODV  . . . . . . . . . . . . . . . . . 1249--1259
             Chien-Fu Cheng and   
                  Kuo-Tang Tsai   Eventual strong consensus with fault
                                  detection in the presence of dual
                                  failure mode on processors under dynamic
                                  networks . . . . . . . . . . . . . . . . 1260--1276
               Dong Kun Noh and   
                    Junbeom Hur   Using a dynamic backbone for efficient
                                  data delivery in solar-powered WSNs  . . 1277--1284
              Longxiang Gao and   
                    Ming Li and   
              Alessio Bonti and   
                Wanlei Zhou and   
                        Shui Yu   $M$-Dimension: Multi-characteristics
                                  based routing protocol in human
                                  associated delay-tolerant networks with
                                  improved performance over one
                                  dimensional classic models . . . . . . . 1285--1296
             Najme Mansouri and   
   Gholam Hosein Dastghaibyfard   A dynamic replica management strategy in
                                  data grid  . . . . . . . . . . . . . . . 1297--1303
          Kenneth J. Turner and   
            Koon Leai Larry Tan   Rigorous development of composite grid
                                  services . . . . . . . . . . . . . . . . 1304--1316
      Mustapha Reda Senouci and   
         Abdelhamid Mellouk and   
               Hadj Senouci and   
                   Amar Aissani   Performance evaluation of network
                                  lifetime spatial-temporal distribution
                                  for WSN routing protocols  . . . . . . . 1317--1328
         Hassen A. Mogaibel and   
             Mohamed Othman and   
        Shamala Subramaniam and   
    Nor Asilah Wati Abdul Hamid   On-demand channel reservation scheme for
                                  common traffic in wireless mesh networks 1329--1351
      Elizabeth A. Thompson and   
                Nathan Clem and   
            Isaac Renninger and   
                   Timothy Loos   Software-defined GPS receiver on
                                  USRP-platform  . . . . . . . . . . . . . 1352--1360
       Ameen M. Alkharasani and   
                 Mohamed Othman   M$^2$I$^2$ tswTCM: a new efficient
                                  optimization marker algorithm to improve
                                  fairness bandwidth in DiffServ networks  1361--1366
                  Miao Zhou and   
                      Yi Mu and   
               Willy Susilo and   
                    Jun Yan and   
                      Liju Dong   Privacy enhanced data outsourcing in the
                                  cloud  . . . . . . . . . . . . . . . . . 1367--1373
Bettahally N. Keshavamurthy and   
            Durga Toshniwal and   
              Bhavani K. Eshwar   Corrigendum to ``Hiding co-occurring
                                  prioritized sensitive patterns over
                                  distributed progressive sequential data
                                  streams'' [J. Network Comput. Appl. \bf
                                  35 (3) (2012) 1116--1129]  . . . . . . . 1374
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 5, September, 2012

           Paolo Bellavista and   
              Chi-Ming Chen and   
               Hossam Hassanein   Special issue on service delivery
                                  management in broadband networks . . . . 1375--1376
      Djamal-Eddine Meddour and   
         Alaeddine Abdallah and   
               Toufik Ahmed and   
                  Raouf Boutaba   A cross layer architecture for multicast
                                  and unicast video transmission in mobile
                                  broadband networks . . . . . . . . . . . 1377--1391
      Cristiano Bonato Both and   
Clarissa Cassales Marquezan and   
               Rafael Kunst and   
Lisandro Zambenedetti Granville and   
                 Juergen Rochol   A self-adapting connection admission
                                  control solution for mobile WiMAX:
                                  Enabling dynamic switching of admission
                                  control algorithms based on predominant
                                  network usage profiles . . . . . . . . . 1392--1401
             Giuseppe Aceto and   
              Alessio Botta and   
     Antonio Pescapé and   
             Maurizio D'Arienzo   Unified architecture for network
                                  measurement: the case of available
                                  bandwidth  . . . . . . . . . . . . . . . 1402--1414
                Werner Sandmann   Delays in a series of queues with
                                  correlated service times . . . . . . . . 1415--1423
          Kaouther Abrougui and   
         Azzedine Boukerche and   
                 Hussam Ramadan   Performance evaluation of an efficient
                                  fault tolerant service discovery
                                  protocol for vehicular networks  . . . . 1424--1435
              Nassima Hadid and   
          Alexandre Guitton and   
                  Michel Misson   Exploiting a meeting channel to
                                  interconnect mobile robots . . . . . . . 1436--1445
            Christos Bouras and   
           Vassilis Poulopoulos   Enhancing meta-portals using dynamic
                                  user context personalization techniques  1446--1453
              Ahmed A. Mosa and   
           Aisha H. Abdalla and   
                Rashid A. Saeed   Evaluation of MANEMO route optimization
                                  schemes  . . . . . . . . . . . . . . . . 1454--1472
        A. Ruiz-Martínez   A survey on solutions and main free
                                  tools for privacy enhancing Web
                                  communications . . . . . . . . . . . . . 1473--1492
           Mohammad Masdari and   
           Mehdi Maleknasab and   
                  Moazam Bidaki   A survey and taxonomy of name systems in
                                  mobile ad hoc networks . . . . . . . . . 1493--1507
      Adamu Murtala Zungeru and   
                Li-Minn Ang and   
                 Kah Phooi Seng   Classical and swarm intelligence based
                                  routing protocols for wireless sensor
                                  networks: a survey and comparison  . . . 1508--1536
                  Liang Liu and   
               Xiao-Lin Qin and   
                 Gui-Neng Zheng   Reliable spatial window aggregation
                                  query processing algorithm in wireless
                                  sensor networks  . . . . . . . . . . . . 1537--1547
     Kranthi K. Mamidisetty and   
         Michael J. Ferrara and   
              Shivakumar Sastry   Systematic selection of cluster heads
                                  for data collection  . . . . . . . . . . 1548--1558
                   Rosen Ivanov   Real-time GPS track simplification
                                  algorithm for outdoor navigation of
                                  visually impaired  . . . . . . . . . . . 1559--1567
                     Yun He and   
            Zhongyang Xiong and   
               Yufang Zhang and   
                Xiaolin Tan and   
                     Zhixing Li   Modeling and analysis of multi-channel
                                  P2P VoD systems  . . . . . . . . . . . . 1568--1578
        Patrick Battistello and   
      Joaquin Garcia-Alfaro and   
    Cyril Delétré   Transaction-based authentication and key
                                  agreement protocol for inter-domain VoIP 1579--1597
               Samia A. Ali and   
          Khaled M. Shaaban and   
             Islam M. Alkabbany   Distributed patching for mobile wireless
                                  sensor networks  . . . . . . . . . . . . 1598--1605
                Jipeng Zhou and   
                Liyang Peng and   
                 Yuhui Deng and   
                     Jianzhu Lu   An on-demand routing protocol for
                                  improving channel use efficiency in
                                  multichannel ad hoc networks . . . . . . 1606--1614
                 Seiven Leu and   
              Ruay-Shiung Chang   A weight-value algorithm for finding
                                  connected dominating sets in a MANET . . 1615--1619
         Bert Vankeirsbilck and   
            Dieter Verslype and   
           Nicolas Staelens and   
             Pieter Simoens and   
             Chris Develder and   
                Bart Dhoedt and   
             Filip De Turck and   
                 Piet Demeester   Automatic fine-grained area detection
                                  for thin client systems  . . . . . . . . 1620--1632
        Javad Akbari Torkestani   Mobility prediction in mobile wireless
                                  networks . . . . . . . . . . . . . . . . 1633--1645
            Ashok Kumar Das and   
              Pranay Sharma and   
         Santanu Chatterjee and   
              Jamuna Kanta Sing   A dynamic password-based user
                                  authentication scheme for hierarchical
                                  wireless sensor networks . . . . . . . . 1646--1656
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 6, November, 2012

            Peer Azmat Shah and   
            Muhammad Yousaf and   
                Amir Qayyum and   
            Halabi B. Hasbullah   Performance comparison of end-to-end
                                  mobility management protocols for TCP    1657--1673
          Allen L. Ramaboli and   
          Olabisi E. Falowo and   
                Anthony H. Chan   Bandwidth aggregation in heterogeneous
                                  wireless networks: a survey of current
                                  approaches and issues  . . . . . . . . . 1674--1690
               Sazia Parvin and   
    Farookh Khadeer Hussain and   
       Omar Khadeer Hussain and   
                   Song Han and   
                Biming Tian and   
                Elizabeth Chang   Cognitive radio network security: a
                                  survey . . . . . . . . . . . . . . . . . 1691--1708
              Shajulin Benedict   Energy-aware performance analysis
                                  methodologies for HPC architectures ---
                                  an exploratory study . . . . . . . . . . 1709--1719
              Tarek Moulahi and   
                Salem Nasri and   
          Hervé Guyennet   Broadcasting based on dominated
                                  connecting sets with MPR in a realistic
                                  environment for WSNs & ad hoc . . . . . . 1720--1727
               JungYul Choi and   
                Min-Gon Kim and   
              Hongkyu Jeong and   
                 Hong-Shik Park   Power-saving mechanisms for energy
                                  efficient IEEE 802.16e/m . . . . . . . . 1728--1739
                  Jihao Yin and   
               Chongyang Fu and   
                     Jiankun Hu   Using incremental subspace and contour
                                  template for object tracking . . . . . . 1740--1748
           Hamid Shokrzadeh and   
          Siavash Khorsandi and   
     Abolfazl Toroghi Haghighat   Optimized query-driven appointment
                                  routing based on
                                  Expectation-Maximization in wireless
                                  sensor networks  . . . . . . . . . . . . 1749--1761
            Kwangcheol Shin and   
               Kyungjun Kim and   
                    Soontae Kim   Traffic management strategy for
                                  delay-tolerant networks  . . . . . . . . 1762--1770
          M. S. Kakkasageri and   
                    S. S. Manvi   Multiagent driven dynamic clustering of
                                  vehicles in VANETs . . . . . . . . . . . 1771--1780
    Alexandre Aguiar Amaral and   
Bruno Bogaz Zarpelão and   
   Leonardo de Souza Mendes and   
Joel José Puga Coelho Rodrigues and   
Mario Lemes Proença Junior   Inference of network anomaly propagation
                                  using spatio-temporal correlation  . . . 1781--1792
                     Q. Shi and   
                   N. Zhang and   
             D. Llewellyn-Jones   Efficient autonomous signature exchange
                                  on ubiquitous networks . . . . . . . . . 1793--1806
        Victoria Ying Zhang and   
            Albert Kai-sun Wong   Kernel-based particle filtering for
                                  indoor tracking in WLANs . . . . . . . . 1807--1817
                Mourad Amad and   
              Ahmed Meddahi and   
          Djamil A\"\issani and   
                  Zonghua Zhang   HPM: a novel hierarchical Peer-to-Peer
                                  model for lookup acceleration with
                                  provision of physical proximity  . . . . 1818--1830
                Sandeep K. Sood   A combined approach to ensure data
                                  security in cloud computing  . . . . . . 1831--1838
                     Zuowen Tan   A lightweight conditional
                                  privacy-preserving authentication and
                                  access control scheme for pervasive
                                  computing environments . . . . . . . . . 1839--1846
                    Bo Dong and   
              Qinghua Zheng and   
                  Feng Tian and   
              Kuo-Ming Chao and   
                     Rui Ma and   
                   Rachid Anane   An optimized approach for storing and
                                  accessing small files on cloud storage   1847--1862
           Rafael Antonello and   
           Stenio Fernandes and   
           Carlos Kamienski and   
               Djamel Sadok and   
              Judith Kelner and   
 István Gódor and   
   Géza Szabó and   
                  Tord Westholm   Deep packet inspection tools and
                                  techniques in commodity platforms:
                                  Challenges and trends  . . . . . . . . . 1863--1878
            Mari Carmen Domingo   An overview of the Internet of
                                  underwater things  . . . . . . . . . . . 1879--1890
          Javier Barrachina and   
             Piedad Garrido and   
               Manuel Fogue and   
      Francisco J. Martinez and   
           Juan-Carlos Cano and   
         Carlos T. Calafate and   
                 Pietro Manzoni   VEACON: a Vehicular Accident Ontology
                                  designed to improve safety on the roads  1891--1900
      Adamu Murtala Zungeru and   
                Li-Minn Ang and   
                 Kah Phooi Seng   Termite-hill: Performance optimized
                                  swarm intelligence based routing
                                  algorithm for wireless sensor networks   1901--1917
           Mohamed Bakillah and   
     Mir Abolfazl Mostafavi and   
          Steve H. L. Liang and   
                 Alexander Zipf   Real time query propagation strategies
                                  with Lightweight Coordination Calculus
                                  (LCC) for ad hoc networks of geospatial
                                  databases  . . . . . . . . . . . . . . . 1918--1933
                 G. Fortino and   
               A. Guerrieri and   
            G. M. P. O'Hare and   
                    A. Ruzzelli   A flexible building management framework
                                  based on wireless sensor and actuator
                                  networks . . . . . . . . . . . . . . . . 1934--1952
                Linfeng Liu and   
               Ruchuan Wang and   
                        Fu Xiao   Topology control algorithm for
                                  underwater wireless sensor networks
                                  using GPS-free mobile sensor nodes . . . 1953--1963
             Gurpreet Singh and   
               Neeraj Kumar and   
               Anil Kumar Verma   Ant colony algorithms in MANETs: a
                                  review . . . . . . . . . . . . . . . . . 1964--1972
                   S. Sudha and   
              N. Ammasaigounden   An aggregate marker for bandwidth
                                  fairness in DiffServ . . . . . . . . . . 1973--1978
                      Li Li and   
              Qing-Shan Jia and   
               Hengtao Wang and   
                 Ruixi Yuan and   
                  Xiaohong Guan   A systematic method for network topology
                                  reconfiguration with limited link
                                  additions  . . . . . . . . . . . . . . . 1979--1989
                Chih-Lin Hu and   
                    Tzu-Han Kuo   A hierarchical overlay with
                                  cluster-based reputation tree for
                                  dynamic peer-to-peer systems . . . . . . 1990--2002
  Miguel Franklin de Castro and   
         Levi Bayde Ribeiro and   
   Camila Helena Souza Oliveira   An autonomic bio-inspired algorithm for
                                  wireless sensor network
                                  self-organization and efficient routing  2003--2015
    Mohammad H. Hajiesmaili and   
             Ahmad Khonsari and   
                 Ali Sehati and   
         Mohammad Sadegh Talebi   Content-aware rate allocation for
                                  efficient video streaming via dynamic
                                  network utility maximization . . . . . . 2016--2027
        Javad Akbari Torkestani   A distributed resource discovery
                                  algorithm for P2P grids  . . . . . . . . 2028--2036
                  D. Gregor and   
                S. L. Toral and   
                   T. Ariza and   
                     F. Barrero   An ontology-based semantic service for
                                  cooperative urban equipments . . . . . . 2037--2050
              Qingyang Song and   
              Zhaolong Ning and   
              Shiqiang Wang and   
               Abbas Jamalipour   Link stability estimation based on link
                                  connectivity changes in mobile ad-hoc
                                  networks . . . . . . . . . . . . . . . . 2051--2058
       Süleyman Kardas and   
        Serkan Çelik and   
            Muhammet Yildiz and   
                    Albert Levi   PUF-enhanced offline RFID security and
                                  privacy  . . . . . . . . . . . . . . . . 2059--2067
          Khalid A. Darabkh and   
          Shereen S. Ismail and   
        Mohammad Al-Shurman and   
              Iyad F. Jafar and   
              Eman Alkhader and   
         Mamoun F. Al-Mistarihi   Performance evaluation of selective and
                                  adaptive heads clustering algorithms
                                  over wireless sensor networks  . . . . . 2068--2080
                     Yi Xie and   
                      J. Hu and   
                    S. Tang and   
                       X. Huang   A structural approach for modelling the
                                  hierarchical dynamic process of Web
                                  workload in a large-scale campus network 2081--2091
             Yuan-Cheng Lai and   
                  Yen-Hung Chen   A best block exploring algorithm for
                                  two-dimensional downlink burst
                                  construction in IEEE 802.16 networks . . 2092--2104
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 36, Number 1, January, 2013

          Abdelkrim Hadjidj and   
               Marion Souil and   
    Abdelmadjid Bouabdallah and   
             Yacine Challal and   
                     Henry Owen   Wireless sensor networks for
                                  rehabilitation applications: Challenges
                                  and opportunities  . . . . . . . . . . . 1--15
              Hung-Jen Liao and   
      Chun-Hung Richard Lin and   
              Ying-Chih Lin and   
                Kuang-Yuan Tung   Intrusion detection system: a
                                  comprehensive review . . . . . . . . . . 16--24
                Ahmed Patel and   
               Mona Taghavi and   
           Kaveh Bakhtiyari and   
Joaquim Celestino Júnior   An intrusion detection and prevention
                                  system in cloud computing: a systematic
                                  review . . . . . . . . . . . . . . . . . 25--41
                Chirag Modi and   
               Dhiren Patel and   
         Bhavesh Borisaniya and   
                Hiren Patel and   
                  Avi Patel and   
        Muttukrishnan Rajarajan   A survey of intrusion detection
                                  techniques in Cloud  . . . . . . . . . . 42--57
               Fadoua Mhiri and   
            Kaouthar Sethom and   
               Ridha Bouallegue   A survey on interference management
                                  techniques in femtocell self-organizing
                                  networks . . . . . . . . . . . . . . . . 58--65
          Md. Mahedi Hassan and   
                 Poo Kuan Hoong   Seamless handover integrated solution
                                  for video transmission over proxy mobile
                                  IPv6 in a micro mobility domain  . . . . 66--76
    Rodrigo Palucci Pantoni and   
          Dennis Brandão   A gradient based routing scheme for
                                  street lighting wireless sensor networks 77--90
            D. Satish Kumar and   
                   N. Nagarajan   Relay technologies and technical issues
                                  in IEEE 802.16j Mobile Multi-hop Relay
                                  (MMR) networks . . . . . . . . . . . . . 91--102
     Christos Emmanouilidis and   
   Remous-Aris Koutsiamanis and   
                Aimilia Tasidou   Mobile guides: Taxonomy of
                                  architectures, context awareness,
                                  technologies and applications  . . . . . 103--125
           Saleem-ullah Lar and   
                  Xiaofeng Liao   An initiative for a classified
                                  bibliography on TCP/IP congestion
                                  control  . . . . . . . . . . . . . . . . 126--133
   A. J. Dinusha Rathnayaka and   
           Vidyasagar M. Potdar   Wireless Sensor Network transport
                                  protocol: a critical review  . . . . . . 134--146
                Slimane Bah and   
                Roch Glitho and   
                Rachida Dssouli   A SIP servlets-based framework for
                                  service provisioning in stand-alone
                                  MANETs . . . . . . . . . . . . . . . . . 147--155
              Seung-Wan Han and   
              In-Seon Jeong and   
                  Seung-Ho Kang   Low latency and energy efficient routing
                                  tree for wireless sensor networks with
                                  multiple mobile sinks  . . . . . . . . . 156--166
               Junjie Xiong and   
               Yangfan Zhou and   
             Michael R. Lyu and   
               Evan F. Y. Young   MDiag: Mobility-assisted diagnosis for
                                  wireless sensor networks . . . . . . . . 167--177
                    Wen Tao Zhu   Towards secure and
                                  communication-efficient broadcast
                                  encryption systems . . . . . . . . . . . 178--186
                    Bing Hu and   
              Kwan L. Yeung and   
                 Zhaoyang Zhang   An efficient single-iteration single-bit
                                  request scheduling algorithm for
                                  input-queued switches  . . . . . . . . . 187--194
               Kemal Akkaya and   
           Izzet F. Senturk and   
            Shanthi Vemulapalli   Handling large-scale node failures in
                                  mobile sensor/robot networks . . . . . . 195--210
             Zhan-feng Wang and   
                  Ming Chen and   
             Chang-you Xing and   
                  Jing Feng and   
              Xiang-lin Wei and   
                     Hua-li Bai   Multi-manifold model of the Internet
                                  delay space  . . . . . . . . . . . . . . 211--218
              Jeroen Famaey and   
Frédéric Iterbeke and   
                Tim Wauters and   
                 Filip De Turck   Towards a predictive cache replacement
                                  strategy for multimedia content  . . . . 219--227
                   Huan Dai and   
               Zhao-min Zhu and   
                   Xiao-Feng Gu   Multi-target indoor localization and
                                  tracking on video monitoring system in a
                                  wireless sensor network  . . . . . . . . 228--234
               Adeela Waqar and   
                  Asad Raza and   
               Haider Abbas and   
          Muhammad Khurram Khan   A framework for preservation of cloud
                                  users' data privacy using dynamic
                                  reconstruction of metadata . . . . . . . 235--248
        Pekka Jäppinen and   
            Renata Guarneri and   
                Luis M. Correia   An applications perspective into the
                                  Future Internet  . . . . . . . . . . . . 249--254
Isabel de la Torre-Díez and   
Saúl Álvaro-Muñoz and   
Miguel López-Coronado and   
                 Joel Rodrigues   Development and performance evaluation
                                  of a new RSS tool for a Web-based
                                  system: RSS\_PROYECT . . . . . . . . . . 255--261
             Marjan Naderan and   
              Mehdi Dehghan and   
                 Hossein Pedram   Sensing task assignment via sensor
                                  selection for maximum target coverage in
                                  WSNs . . . . . . . . . . . . . . . . . . 262--273
          Reinaldo B. Braga and   
             Igor A. Chaves and   
      Carina T. de Oliveira and   
      Rossana M. C. Andrade and   
José Neuman de Souza and   
        Hervé Martin and   
                  Bruno Schulze   RETENTION: a reactive trust-based
                                  mechanism to detect and punish malicious
                                  nodes in ad hoc grid environments  . . . 274--283
                 Lo-Yao Yeh and   
            Chun-Chuan Yang and   
             Jee-Gong Chang and   
                   Yi-Lang Tsai   A secure and efficient batch binding
                                  update scheme for route optimization of
                                  nested NEtwork MObility (NEMO) in VANETs 284--292
                 Minwoo Kim and   
                 Karam Park and   
                      Won W. Ro   Benefits of using parallelized
                                  non-progressive network coding . . . . . 293--305
                  Ting Yang and   
                 Yugeng Sun and   
               Javid Taheri and   
               Albert Y. Zomaya   DLS: a dynamic local stitching mechanism
                                  to rectify transmitting path fragments
                                  in wireless sensor networks  . . . . . . 306--315
                Kaiping Xue and   
                Changsha Ma and   
                Peilin Hong and   
                      Rong Ding   A temporal-credential-based mutual
                                  authentication and key agreement scheme
                                  for wireless sensor networks . . . . . . 316--323
              Rafiqul Islam and   
                  Jemal Abawajy   A multi-tier phishing detection and
                                  filtering approach . . . . . . . . . . . 324--335
       Vishnu Monn Baskaran and   
          Yoong Choon Chang and   
               Jonathan Loo and   
                  KokSheik Wong   Software-based serverless endpoint video
                                  combiner architecture for
                                  high-definition multiparty video
                                  conferencing . . . . . . . . . . . . . . 336--352
                  Mingfu Li and   
                Yueh-Lin Wu and   
                Chia-Rong Chang   Available bandwidth estimation for the
                                  network paths with multiple tight links
                                  and bursty traffic . . . . . . . . . . . 353--367
         Fadi M. Al-Turjman and   
        Hossam S. Hassanein and   
               Mohamad Ibnkahla   Quantifying connectivity in wireless
                                  sensor networks with grid-based
                                  deployments  . . . . . . . . . . . . . . 368--377
                     Xun Yi and   
                   Eiji Okamoto   Practical Internet voting system . . . . 378--387
                Yuehua Wang and   
                 Zhong Zhou and   
                   Ling Liu and   
                         Wei Wu   Replica-aided load balancing in overlay
                                  networks . . . . . . . . . . . . . . . . 388--401
                  D. Rosaci and   
          G. M. L. Sarné   Cloning mechanisms to improve agent
                                  performances . . . . . . . . . . . . . . 402--408
               M. Hooshmand and   
       S. M. R. Soroushmehr and   
                 P. Khadivi and   
                  S. Samavi and   
                     S. Shirani   Visual sensor network lifetime
                                  maximization by prioritized scheduling
                                  of nodes . . . . . . . . . . . . . . . . 409--419
                Weigang Hou and   
                    Lei Guo and   
                   Xiaoxue Gong   Survivable power efficiency oriented
                                  integrated grooming in green networks    420--428
     Jesús L. Alvaro and   
                 Beatriz Barros   A new cloud computing architecture for
                                  music composition  . . . . . . . . . . . 429--443
               I-Hsuan Peng and   
                   Yen-Wen Chen   Energy consumption bounds analysis and
                                  its applications for grid based wireless
                                  sensor networks  . . . . . . . . . . . . 444--451
                   K. Salah and   
                      M. Hamawi   Performance of IP-forwarding of Linux
                                  hosts with multiple network interfaces   452--465
                 Imran Baig and   
              Muhammad Ayaz and   
                    Varun Jeoti   On the peak-to-average power ratio
                                  reduction in mobile WiMAX: a discrete
                                  cosine transform matrix precoding based
                                  random-interleaved orthogonal frequency
                                  division multiple access uplink system   466--475
                Mary Looney and   
                   Oliver Gough   A provision aware proportional fair
                                  sharing three colour marker  . . . . . . 476--483
    Maria-Victoria Belmonte and   
         Manuel Díaz and   
Jose-Luis Pérez-de-la-Cruz and   
                      Ana Reyna   COINS: COalitions and INcentiveS for
                                  effective Peer-to-Peer downloads . . . . 484--497
                    Chao Lv and   
                   Maode Ma and   
                     Hui Li and   
                Jianfeng Ma and   
                    Yaoyu Zhang   An novel three-party authenticated key
                                  exchange protocol using one-time key . . 498--503
Eugénia Moreira Bernardino and   
 Anabela Moreira Bernardino and   
Juan Manuel Sánchez-Pérez and   
Juan Antonio Gómez Pulido and   
Miguel A. Vega Rodríguez   Swarm optimisation algorithms applied to
                                  large balanced communication networks    504--522
       Haythem Bany Salameh and   
             Osamah S. Badarneh   Opportunistic medium access control for
                                  maximizing packet delivery rate in
                                  dynamic access networks  . . . . . . . . 523--532
              Ting-Yi Chang and   
                      Yan-Ru Ke   A personalized e-course composition
                                  based on a genetic algorithm with
                                  forcing legality in an adaptive learning
                                  system . . . . . . . . . . . . . . . . . 533--542
              Sepideh Adabi and   
               Ali Movaghar and   
        Amir Masoud Rahmani and   
                    Hamid Beigy   Market-based grid resource allocation
                                  using new negotiation model  . . . . . . 543--565
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 2, March, 2013

                Bingdong Li and   
              Jeff Springer and   
               George Bebis and   
              Mehmet Hadi Gunes   A survey of network flow applications    567--581
                 Shams Qazi and   
                  Raad Raad and   
                      Yi Mu and   
                   Willy Susilo   Securing DSR against wormhole attacks in
                                  multirate ad hoc networks  . . . . . . . 582--592
      Ahmed Hassan Mohammed and   
                    Bin Dai and   
             Benxiong Huang and   
             Muhammad Azhar and   
                    Guan Xu and   
                   Peng Qin and   
                        Shui Yu   A survey and tutorial of wireless relay
                                  network protocols based on network
                                  coding . . . . . . . . . . . . . . . . . 593--610
                Xiaobing He and   
        Michael Niedermeier and   
                Hermann de Meer   Dynamic key management in wireless
                                  sensor networks: a survey  . . . . . . . 611--622
            Sudhanshu Tyagi and   
                   Neeraj Kumar   A systematic review on clustering and
                                  routing techniques based upon LEACH
                                  protocol for wireless sensor networks    623--645
              Rafiqul Islam and   
               Ronghua Tian and   
             Lynn M. Batten and   
                 Steve Versteeg   Classification of malware based on
                                  integrated static and dynamic features   646--656
                  Kun Huang and   
                Gaogang Xie and   
                     Rui Li and   
                    Shuai Xiong   Fast and deterministic hash table lookup
                                  using discriminative Bloom filters . . . 657--666
                   Chiapin Wang   Dynamic ARF for throughput improvement
                                  in 802.11 WLAN via a machine-learning
                                  approach . . . . . . . . . . . . . . . . 667--676
        Eyüp S. Canlar and   
                Mauro Conti and   
               Bruno Crispo and   
              Roberto Di Pietro   Windows Mobile LiveSD Forensics  . . . . 677--684
      Sardar Muhammad Bilal and   
     Carlos Jesus Bernardos and   
                Carmen Guerrero   Position-based routing in vehicular
                                  networks: a survey . . . . . . . . . . . 685--697
              M. Kretschmer and   
                 P. Batroff and   
                      G. Ghinea   Topology forming and optimization
                                  framework for heterogeneous wireless
                                  back-haul networks supporting
                                  unidirectional technologies  . . . . . . 698--710
             Najme Mansouri and   
Gholam Hosein Dastghaibyfard and   
                 Ehsan Mansouri   Combination of data replication and
                                  scheduling algorithm for improving data
                                  availability in Data Grids . . . . . . . 711--722
           D. C. Vasiliadis and   
                G. E. Rizos and   
                  C. Vassilakis   Modelling and performance study of
                                  finite-buffered blocking multistage
                                  interconnection networks supporting
                                  natively $2$-class priority routing
                                  traffic  . . . . . . . . . . . . . . . . 723--737
               Shiliang Luo and   
                      Xu Lu and   
                 Lianglun Cheng   TSOIA: an efficient node selection
                                  algorithm facing the uncertain process
                                  for Internet of Things . . . . . . . . . 738--743
              Gimer Cervera and   
             Michel Barbeau and   
      Joaquin Garcia-Alfaro and   
             Evangelos Kranakis   A multipath routing strategy to prevent
                                  flooding disruption attacks in link
                                  state routing protocols for MANETs . . . 744--755
             Kuang-Yow Lian and   
            Sung-Jung Hsiao and   
                  Wen-Tsai Sung   Intelligent multi-sensor control system
                                  based on innovative technology
                                  integration via ZigBee and Wi-Fi
                                  networks . . . . . . . . . . . . . . . . 756--767
               Po-Ching Lin and   
                    Jia-Hau Lee   Re-examining the performance bottleneck
                                  in a NIDS with detailed profiling  . . . 768--780
                   Yan Yang and   
               Yulong Zhang and   
              Alex Hai Wang and   
                    Meng Yu and   
                 Wanyu Zang and   
                   Peng Liu and   
                 Sushil Jajodia   Quantitative survivability evaluation of
                                  three virtual machine-based server
                                  architectures  . . . . . . . . . . . . . 781--790
                      C. Xu and   
                      C. Du and   
                 G. F. Zhao and   
                          S. Yu   A novel model for user clicks
                                  identification based on hidden
                                  semi-Markov  . . . . . . . . . . . . . . 791--798
                    Jian An and   
                Xiaolin Gui and   
              Wendong Zhang and   
               Jinhua Jiang and   
                   Jianwei Yang   Research on social relations cognitive
                                  model of mobile nodes in Internet of
                                  Things . . . . . . . . . . . . . . . . . 799--810
                Yanheng Liu and   
              Longxiang Suo and   
                 Dayang Sun and   
                     Aimin Wang   A virtual square grid-based coverage
                                  algorithm of redundant node for wireless
                                  sensor network . . . . . . . . . . . . . 811--817
                  Peng Xiao and   
                 Zhigang Hu and   
                 Dongbo Liu and   
                Guofeng Yan and   
                      Xilong Qu   Virtual machine power measuring
                                  technique with bounded error in cloud
                                  environments . . . . . . . . . . . . . . 818--828
              Gaik-Yee Chan and   
             Chien-Sing Lee and   
                 Swee-Huay Heng   Discovering fuzzy association rule
                                  patterns and increasing sensitivity
                                  analysis of XML-related attacks  . . . . 829--842
                Yuhuai Peng and   
                     Yao Yu and   
                    Lei Guo and   
               Dingde Jiang and   
                     Qiming Gai   An efficient joint channel assignment
                                  and QoS routing protocol for IEEE 802.11
                                  multi-radio multi-channel wireless mesh
                                  networks . . . . . . . . . . . . . . . . 843--857
             Shahram Jamali and   
Seyyed Nasser Seyyed Hashemi and   
 Amir Masoud Eftekhari Moghadam   On the use of a full information
                                  feedback to stabilize RED  . . . . . . . 858--869
Abraham Martín-Campillo and   
              Jon Crowcroft and   
                Eiko Yoneki and   
             Ramon Martí   Evaluating opportunistic networks in
                                  disaster scenarios . . . . . . . . . . . 870--880
               Mahesh Kumar and   
                  Shishir Kumar   AGRIB-BHF: a sustainable and fault
                                  tolerant aggregation . . . . . . . . . . 881--886
         Mahmoud Al-shugran and   
              Osman Ghazali and   
             Suhaidi Hassan and   
               Kashif Nisar and   
                A. Suki M. Arif   A qualitative comparison evaluation of
                                  the greedy forwarding strategies in
                                  Mobile Ad Hoc Network  . . . . . . . . . 887--897
                 Laisen Nie and   
               Dingde Jiang and   
                        Lei Guo   A power laws-based reconstruction
                                  approach to end-to-end network traffic   898--907
                 Enver Ever and   
          Orhan Gemikonakli and   
             Altan Kocyigit and   
               Eser Gemikonakli   A hybrid approach to minimize state
                                  space explosion problem for the solution
                                  of two stage tandem queues . . . . . . . 908--926
                   Hu Xiong and   
                 Zhong Chen and   
                       Fagen Li   New identity-based three-party
                                  authenticated key agreement protocol
                                  with provable security . . . . . . . . . 927--932
               Kashif Nisar and   
            Angela Amphawan and   
             Suhaidi Hassan and   
                Nurul I. Sarkar   A comprehensive survey on scheduler for
                                  VoIP over WLAN . . . . . . . . . . . . . 933--948
           Mohamed K. Watfa and   
       Haitham Al-Hassanieh and   
                   Samir Salmen   A novel solution to the energy hole
                                  problem in sensor networks . . . . . . . 949--958
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 3, May, 2013

    Joel J. P. C. Rodrigues and   
               Russel Hsing and   
                   Min Chen and   
                Bingli Jiao and   
                   Binod Vaidya   Guest Editorial on Vehicular Networking
                                  Protocols  . . . . . . . . . . . . . . . 959--960
     António Fonseca and   
            Teresa Vazão   Applicability of position-based routing
                                  for VANET in highways and urban
                                  environment  . . . . . . . . . . . . . . 961--973
             Rajashree Nair and   
                    Ben Soh and   
         Naveen Chilamkurti and   
      James J. (Jong Hyuk) Park   Structure-free message aggregation and
                                  routing in traffic information system
                                  (SMART)  . . . . . . . . . . . . . . . . 974--980
                Salim Bitam and   
             Abdelhamid Mellouk   Bee life-based multi constraints
                                  multicast routing optimization for
                                  vehicular ad hoc networks  . . . . . . . 981--991
              Zhenxia Zhang and   
         Azzedine Boukerche and   
                 Hussam Ramadan   Design and evaluation of a fast MAC
                                  layer handoff management scheme for
                                  WiFi-based multichannel Vehicular Mesh
                                  Networks . . . . . . . . . . . . . . . . 992--1000
       Angelos Antonopoulos and   
         Charalabos Skianis and   
            Christos Verikoukis   Network coding-based cooperative ARQ
                                  scheme for VANETs  . . . . . . . . . . . 1001--1007
              Navid Tadayon and   
             Sasan Khoshroo and   
              Elaheh Askari and   
              Honggang Wang and   
                  Howard Michel   Power management in SMAC-based
                                  energy-harvesting wireless sensor
                                  networks using queuing analysis  . . . . 1008--1017
              Youxiang Wang and   
              Jianquan Wang and   
                Lu Zhaobiao and   
                    Xingang Liu   Performance improvement of QO-STBC over
                                  time-selective channel for wireless
                                  network  . . . . . . . . . . . . . . . . 1018--1026
               Jaime Lloret and   
          Alejandro Canovas and   
        Angel Catalá and   
                  Miguel Garcia   Group-based protocol and mobility model
                                  for VANETs to offer Internet access  . . 1027--1038
          Md. Humayun Kabir and   
    Mohammad Mukhtaruzzaman and   
           Mohammed Atiquzzaman   Efficient route optimization scheme for
                                  nested-NEMO  . . . . . . . . . . . . . . 1039--1049
                Liren Zhang and   
         Abderrahmane Lakas and   
            Hesham El-Sayed and   
                   Ezedin Barka   Mobility analysis in vehicular ad hoc
                                  network (VANET)  . . . . . . . . . . . . 1050--1056
                  Yejun Liu and   
              Qingyang Song and   
                     Rui Ma and   
                    Bing Li and   
                        Bo Gong   Protection based on backup radios and
                                  backup fibers for survivable
                                  Fiber-Wireless (FiWi) access network . . 1057--1069
              Jian-Zhen Luo and   
                  Shun-Zheng Yu   Position-based automatic reverse
                                  engineering of network protocols . . . . 1070--1077
         Masoud Zarifneshat and   
                 Pejman Khadivi   Using mobile node speed changes for
                                  movement direction change prediction in
                                  a realistic category of mobility models  1078--1090
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 4, July, 2013

          Ebrahim Mahdipour and   
        Amir Masoud Rahmani and   
                Saeed Setayeshi   Importance sampling for Jackson networks
                                  with customer impatience until the end
                                  of service . . . . . . . . . . . . . . . 1091--1101
                   C. Dumez and   
                M. Bakhouya and   
                   J. Gaber and   
                    M. Wack and   
                      P. Lorenz   Model-driven approach supporting formal
                                  verification for web service composition
                                  protocols  . . . . . . . . . . . . . . . 1102--1115
              Nader Mohamed and   
         Jameela Al-Jaroodi and   
                    Abdulla Eid   A dual-direction technique for fast file
                                  downloads with dynamic load balancing in
                                  the Cloud  . . . . . . . . . . . . . . . 1116--1130
               Ammar Haider and   
               Iqbal Gondal and   
            Joarder Kamruzzaman   Social-connectivity-aware vertical
                                  handover for heterogeneous wireless
                                  networks . . . . . . . . . . . . . . . . 1131--1139
           A. Cagatay Talay and   
              D. Turgay Altilar   Self adaptive routing for dynamic
                                  spectrum access in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1140--1151
             Jasone Astorga and   
              Marina Aguado and   
               Nerea Toledo and   
                 Marivi Higuero   A high performance link layer mobility
                                  management strategy for professional
                                  private broadband networks . . . . . . . 1152--1163
           Chien-Chao Tseng and   
             Chia-Liang Lin and   
               Li-Hsing Yen and   
               Jyun-Yan Liu and   
                  Cheng-Yuan Ho   Can: a context-aware NAT traversal
                                  scheme . . . . . . . . . . . . . . . . . 1164--1173
                D. D. Geeta and   
                  N. Nalini and   
         Rajashekhar C. Biradar   Fault tolerance in wireless sensor
                                  network using hand-off and dynamic power
                                  adjustment approach  . . . . . . . . . . 1174--1185
              Chao-Yang Lee and   
           Liang-Cheng Shiu and   
                Fu-Tian Lin and   
                  Chu-Sing Yang   Distributed topology control algorithm
                                  on broadcasting in wireless sensor
                                  network  . . . . . . . . . . . . . . . . 1186--1195
        El-Sayed M. El-Alfy and   
            Syed N. Mujahid and   
                Shokri Z. Selim   A Pareto-based hybrid multiobjective
                                  evolutionary approach for constrained
                                  multipath traffic engineering
                                  optimization in MPLS/GMPLS networks  . . 1196--1207
               Ying-Dar Lin and   
              Cheng-Yuan Ho and   
             Yuan-Cheng Lai and   
              Tzu-Hsiung Du and   
                 Shun-Lee Chang   Booting, browsing and streaming time
                                  profiling, and bottleneck analysis on
                                  Android-based systems  . . . . . . . . . 1208--1218
                 Anwar Saif and   
                 Mohamed Othman   SRA-MSDU: Enhanced A-MSDU frame
                                  aggregation with selective
                                  retransmission in 802.11n wireless
                                  networks . . . . . . . . . . . . . . . . 1219--1229
      Muhammad Hamad Alizai and   
                Hanno Wirtz and   
           Bernhard Kirchen and   
                   Klaus Wehrle   Portable wireless-networking protocol
                                  evaluation . . . . . . . . . . . . . . . 1230--1242
           Mohammad Masdari and   
Sadegh Mohammadzadeh Bazarchi and   
                  Moazam Bidaki   Analysis of Secure LEACH-Based
                                  Clustering Protocols in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1243--1260
           Aishwarya Bakshi and   
          Amir Talaei-Khoei and   
                    Pradeep Ray   Adaptive policy framework: a systematic
                                  review . . . . . . . . . . . . . . . . . 1261--1271
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 5, September, 2013

    Joel J. P. C. Rodrigues and   
               Russel Hsing and   
                   Min Chen and   
                Bingli Jiao and   
                   Binod Vaidya   Guest editorial on vehicular
                                  communications and applications  . . . . 1273--1274
                 C. Campolo and   
             H. A. Cozzetti and   
                A. Molinaro and   
                    R. Scopigno   Augmenting Vehicle-to-Roadside
                                  connectivity in multi-channel vehicular
                                  Ad Hoc Networks  . . . . . . . . . . . . 1275--1286
                  Yazhi Liu and   
                Jianwei Niu and   
                    Jian Ma and   
                    Lei Shu and   
              Takahiro Hara and   
                   Wendong Wang   The insights of message delivery delay
                                  in VANETs with a bidirectional traffic
                                  model  . . . . . . . . . . . . . . . . . 1287--1294
                   R. Bauza and   
                    J. Gozalvez   Traffic congestion detection in
                                  large-scale scenarios using
                                  vehicle-to-vehicle communications  . . . 1295--1307
             Nitin Maslekar and   
              Joseph Mouzna and   
          Mounir Boussedjra and   
                   Houda Labiod   CATS: an adaptive traffic signal system
                                  based on car-to-car communication  . . . 1308--1315
                        Kai Lin   Research on adaptive target tracking in
                                  vehicle sensor networks  . . . . . . . . 1316--1323
               Nerea Toledo and   
          Jean Marie Bonnin and   
                 Marivi Higuero   Performance evaluation of user
                                  applications in the ITS scenario: an
                                  analytical assessment of the NeMHIP  . . 1324--1336
 Carlos Gañán and   
       Jose L. Muñoz and   
              Oscar Esparza and   
     Jorge Mata-Díaz and   
Juan Hernández-Serrano and   
                   Juanjo Alins   COACH: COllaborative certificate stAtus
                                  CHecking mechanism for VANETs  . . . . . 1337--1351
                  Bidi Ying and   
         Dimitrios Makrakis and   
             Hussein T. Mouftah   Privacy preserving broadcast message
                                  authentication protocol for VANETs . . . 1352--1364
                   Xiong Li and   
                Jianwei Niu and   
      Muhammad Khurram Khan and   
                    Junguo Liao   An enhanced smart card based remote user
                                  password authentication scheme . . . . . 1365--1371
                Hai Van Luu and   
                    Xueyan Tang   Constructing rings overlay for robust
                                  data collection in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1372--1386
                  Ting Chen and   
            Xiao-song Zhang and   
               Hong-yuan Li and   
                  Dong Wang and   
                         Yue Wu   Propagation modeling of active P2P worms
                                  based on ternary matrix  . . . . . . . . 1387--1394
               Sulma Rashid and   
       Abdul Hanan Abdullah and   
                Qaisar Ayub and   
           M. Soperi Mohd Zahid   Dynamic Prediction based Multi Queue
                                  (DPMQ) drop policy for probabilistic
                                  routing protocols of delay tolerant
                                  network  . . . . . . . . . . . . . . . . 1395--1402
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 6, November, 2013

               Weiming Shen and   
                     Weidong Li   Collaboration technologies and
                                  applications . . . . . . . . . . . . . . 1403--1404
        Steven Latré and   
              Jeroen Famaey and   
             John Strassner and   
                 Filip De Turck   Automated context dissemination for
                                  autonomic collaborative networks through
                                  semantic subscription filter generation  1405--1417
                 Yuanhao Xu and   
                  Guofu Yin and   
                   Yong Nie and   
                Zhengwei He and   
                    Xiaolin Dai   Research on an active knowledge push
                                  service based on collaborative intent
                                  capture  . . . . . . . . . . . . . . . . 1418--1430
                     Tao Wu and   
               Xiaobing Pei and   
               Yongzhong Lu and   
             Changqing Chen and   
                      Liang Gao   A distributed collaborative product
                                  design environment based on semantic
                                  norm model and role-based access control 1431--1440
          Amy J. C. Trappey and   
         Charles V. Trappey and   
                 Chun-Yi Wu and   
              Chin Yuan Fan and   
                   Yi-Liang Lin   Intelligent patent recommendation system
                                  for innovative design collaboration  . . 1441--1450
      Diego Carvalho Soares and   
Flávia Maria Santoro and   
   Fernanda Araujo Baião   Discovering collaborative
                                  knowledge-intensive processes through
                                  e-mail mining  . . . . . . . . . . . . . 1451--1465
              Pedro Antunes and   
        David Simões and   
        Luis Carriço and   
            José A. Pino   An end-user approach to business process
                                  modeling . . . . . . . . . . . . . . . . 1466--1479
                Rahat Iqbal and   
               Nazaraf Shah and   
                 Anne James and   
               Tomasz Cichowicz   Integration, optimization and usability
                                  of enterprise applications . . . . . . . 1480--1488
                  Leijie Fu and   
               Pingyu Jiang and   
                        Wei Cao   Modeling and performance analysis of
                                  product development process network  . . 1489--1502
                 Ta-Ping Lu and   
          Amy J. C. Trappey and   
              Yi-Kuang Chen and   
                    Yu-Da Chang   Collaborative design and analysis of
                                  supply chain network management key
                                  processes model  . . . . . . . . . . . . 1503--1511
                 Yuan Cheng and   
                   Fazhi He and   
                Xiantao Cai and   
                    Dejun Zhang   A group Undo/Redo method in $3$D
                                  collaborative modeling systems with
                                  performance evaluation . . . . . . . . . 1512--1522
              Jiancheng Shi and   
                Jianhua Liu and   
                 Ruxin Ning and   
                     Weiwei Hou   A collisions evaluation method in
                                  virtual environment for collaborative
                                  assembly . . . . . . . . . . . . . . . . 1523--1530
                    Bin Guo and   
               Daqing Zhang and   
                   Zhu Wang and   
                  Zhiwen Yu and   
                   Xingshe Zhou   Opportunistic IoT: Exploring the
                                  harmonious interaction between human and
                                  the Internet of Things . . . . . . . . . 1531--1539
                  Yang Yang and   
                   Xinyu Li and   
                  Liang Gao and   
                     Xinyu Shao   A new approach for predicting and
                                  collaborative evaluating the cutting
                                  force in face milling based on gene
                                  expression programming . . . . . . . . . 1540--1550
      Jesús Gallardo and   
              Ana I. Molina and   
           Crescencio Bravo and   
              Miguel A. Redondo   A model-driven and task-oriented method
                                  for the development of collaborative
                                  systems  . . . . . . . . . . . . . . . . 1551--1565
María Blanca Ibáñez and   
José J. García Rueda and   
               David Maroto and   
           Carlos Delgado Kloos   Collaborative learning in multi-user
                                  virtual environments . . . . . . . . . . 1566--1576
               Weiming Shen and   
                     Weidong Li   Collaboration computing technologies and
                                  applications . . . . . . . . . . . . . . 1577--1578
                  Dujuan Gu and   
                Xiaohan Liu and   
                   Gang Qin and   
             Shuangjian Yan and   
                     Ze luo and   
                    Baoping Yan   VNET6: IPv6 virtual network for the
                                  collaboration between applications and
                                  networks . . . . . . . . . . . . . . . . 1579--1588
          Anbazhagan Rajesh and   
           Rangaswamy Nakkeeran   Investigation on uplink collaborative
                                  contention-based bandwidth request for
                                  WiMAX three hop relay networks . . . . . 1589--1598
               Yuanyuan Pan and   
                    Jianqing Li   Cooperative pseudonym change scheme
                                  based on the number of neighbors in
                                  VANETs . . . . . . . . . . . . . . . . . 1599--1609
         Dami\`a Castell\`a and   
       Francesc Giné and   
           Francesc Solsona and   
      Josep Lluis Lérida   Analyzing locality over a P2P computing
                                  architecture . . . . . . . . . . . . . . 1610--1619
                 Josep Rius and   
             Fernando Cores and   
               Francesc Solsona   Cooperative scheduling mechanism for
                                  large-scale peer-to-peer computing
                                  systems  . . . . . . . . . . . . . . . . 1620--1631
            Sheng-Cheng Yeh and   
               Ming-Yang Su and   
               Hui-Hui Chen and   
                  Chun-Yuen Lin   An efficient and secure approach for a
                                  cloud collaborative editing  . . . . . . 1632--1641
                Hongchen Wu and   
                Xinjun Wang and   
               Zhaohui Peng and   
                   Qingzhong Li   Div-clustering: Exploring active users
                                  for social collaborative recommendation  1642--1650
                Ho Leung Li and   
               Vincent T. Y. Ng   Discovering associations between news
                                  and contents in social network sites
                                  with the D-Miner service framework . . . 1651--1659
              Xiaogang Wang and   
                  Ming Yang and   
                    Junzhou Luo   A novel sequential watermark detection
                                  model for efficient traceback of secret
                                  network attack flows . . . . . . . . . . 1660--1670
                 Jian Jiang and   
                     Wei Li and   
                Junzhou Luo and   
                       Jing Tan   A network accountability based
                                  verification mechanism for detecting
                                  inter-domain routing path inconsistency  1671--1683
               JunPing Wang and   
                Qiliang Zhu and   
                         Yan Ma   An agent-based hybrid service delivery
                                  for coordinating Internet of Things and
                                  3rd party service providers  . . . . . . 1684--1695
                 Wenfeng Li and   
                   Ye Zhong and   
                   Xun Wang and   
                     Yulian Cao   Resource virtualization and service
                                  selection in cloud logistics . . . . . . 1696--1704
       Mojtaba Seyedzadegan and   
             Mohamed Othman and   
       Borhanuddin Mohd Ali and   
            Shamala Subramaniam   Zero-Degree algorithm for Internet
                                  GateWay placement in backbone wireless
                                  mesh networks  . . . . . . . . . . . . . 1705--1723
               Wu-Hsiao Hsu and   
                 Yuh-Pyng Shieh   Virtual network mapping algorithm in the
                                  cloud infrastructure . . . . . . . . . . 1724--1734
         Juan Felipe Botero and   
              Miguel Molina and   
    Xavier Hesselbach-Serra and   
   José Roberto Amazonas   A novel paths algebra-based strategy to
                                  flexibly solve the link mapping stage of
                                  VNE problems . . . . . . . . . . . . . . 1735--1752
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 37, Number ??, January, 2014

                   Hyuk Lim and   
          James Chang Wu Yu and   
                   Binod Vaidya   Advances in multimedia services over
                                  emerging wireless networks . . . . . . . 1
                Pradipta De and   
          Nilanjan Banerjee and   
                      Swades De   Exploiting multiple description coding
                                  for intermediate recovery in wireless
                                  mesh networks  . . . . . . . . . . . . . 2--11
             Paulo A. Neves and   
    Joel J. P. C. Rodrigues and   
                   Min Chen and   
        Athanasios V. Vasilakos   A multi-channel architecture for
                                  IPv6-enabled wireless sensor and
                                  actuator networks featuring PnP support  12--24
               Soocheol Lee and   
               Seungmin Rho and   
                 Jong Hyuk Park   Multimedia contents adaptation by
                                  modality conversion with user preference
                                  in wireless network  . . . . . . . . . . 25--32
               Hayoung Yoon and   
                JongWon Kim and   
                   Robert Hsieh   Peer-assisted video on-demand streaming
                                  system in practical WiFi-based mobile
                                  opportunistic networks . . . . . . . . . 33--44
               Maria Ganzha and   
               Marcin Paprzycki   Agent-oriented computing for distributed
                                  systems and networks . . . . . . . . . . 45--46
                Dongsoo Kim and   
                  Eric Noel and   
                  K. Wendy Tang   Expanded Borel Cayley Graphs (Ex-BCGs):
                                  a novel communication topology for
                                  multi-agent systems  . . . . . . . . . . 47--61
        Shashank Srivastava and   
                    G. C. Nandi   Self-reliant mobile code: a new
                                  direction of agent security  . . . . . . 62--75
     Antonín Komenda and   
         Peter Novák and   
               Michal Pechoucek   Domain-independent multi-agent plan
                                  repair . . . . . . . . . . . . . . . . . 76--88
              Sepideh Adabi and   
               Ali Movaghar and   
        Amir Masoud Rahmani and   
                Hamid Beigy and   
    Hengameh Dastmalchy-Tabrizi   A new fuzzy negotiation protocol for
                                  grid resource allocation . . . . . . . . 89--126
          Giancarlo Fortino and   
                Wilma Russo and   
                 Marino Vaccaro   An agent-based approach for the design
                                  and analysis of content delivery
                                  networks . . . . . . . . . . . . . . . . 127--145
      Álvaro Carrera and   
         Carlos A. Iglesias and   
Javier García-Algarra and   
           Dusan Kolarík   A real-life application of multi-agent
                                  systems for fault diagnosis in the
                                  provision of an Internet business
                                  service  . . . . . . . . . . . . . . . . 146--154
                 Wenjia Niu and   
                    Gang Li and   
                Endong Tong and   
               Xinghua Yang and   
                Liang Chang and   
               Zhongzhi Shi and   
                        Song Ci   Interaction relationships of caches in
                                  agent-based HD video surveillance:
                                  Discovery and utilization  . . . . . . . 155--169
Jaime Galán-Jiménez and   
           Alfonso Gazo-Cervero   Using bio-inspired algorithms for energy
                                  levels assessment in energy efficient
                                  wired communication networks . . . . . . 171--185
                   Jiguo Yu and   
               Qingbo Zhang and   
                Dongxiao Yu and   
              Congcong Chen and   
                  Guanghui Wang   Domatic partition in homogeneous
                                  wireless sensor networks . . . . . . . . 186--193
          Demetris Hoplaros and   
                 Zahir Tari and   
                 Ibrahim Khalil   Data summarization for network traffic
                                  monitoring . . . . . . . . . . . . . . . 194--205
             Chi-Tao Chiang and   
            Hung-Chang Chen and   
               Wen-Hwa Liao and   
                 Kuei-Ping Shih   A decentralized minislot scheduling
                                  protocol (DMSP) in TDMA-based wireless
                                  mesh networks  . . . . . . . . . . . . . 206--215
           Abbas Ali Rezaee and   
  Mohammad Hossein Yaghmaee and   
        Amir Masoud Rahmani and   
      Amir Hossein Mohajerzadeh   HOCA: Healthcare Aware Optimized
                                  Congestion Avoidance and control
                                  protocol for wireless sensor networks    216--228
              Chih-Min Chao and   
                 Tzu-Ying Hsiao   Design of structure-free and
                                  energy-balanced data aggregation in
                                  wireless sensor networks . . . . . . . . 229--239
                Sajjad Zare and   
       Akbar Ghaffarpour Rahbar   Congestion control in IPTV over PON
                                  using Digital Fountain forward error
                                  correction . . . . . . . . . . . . . . . 240--252
                    Feng Li and   
                    Li Wang and   
                     Weidang Lu   Potential bargaining for resource
                                  allocation in cognitive relay
                                  transmission . . . . . . . . . . . . . . 253--258
                Yuhuai Peng and   
              Qingyang Song and   
                     Yao Yu and   
                       Fei Wang   Fault-tolerant routing mechanism based
                                  on network coding in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 259--272
                  Yuemei Xu and   
                    Yang Li and   
                    Tao Lin and   
                 Zihou Wang and   
                 Wenjia Niu and   
                   Hui Tang and   
                        Song Ci   A novel cache size optimization scheme
                                  based on manifold learning in Content
                                  Centric Networking . . . . . . . . . . . 273--281
            Jacques M. Bahi and   
                Xiaole Fang and   
          Christophe Guyeux and   
                   Qianxue Wang   Suitability of chaotic iterations
                                  schemes using XORshift for security
                                  applications . . . . . . . . . . . . . . 282--292
              Conor Cameron and   
             Ibrahim Khalil and   
                     Zahir Tari   An ID-based approach to the caching and
                                  distribution of peer-to-peer,
                                  proxy-based video content  . . . . . . . 293--314
                  Wei Zheng and   
                     Tao Su and   
               Haijun Zhang and   
                     Wei Li and   
                 Xiaoli Chu and   
                  Xiangming Wen   Distributed power optimization for
                                  spectrum-sharing femtocell networks: a
                                  fictitious game approach . . . . . . . . 315--322
                  Guilin Li and   
              Longjiang Guo and   
                   Xing Gao and   
                  Minghong Liao   Bloom filter based processing algorithms
                                  for the multi-dimensional event query in
                                  wireless sensor networks . . . . . . . . 323--333
                Jianwei Niu and   
               Wenfang Song and   
           Mohammed Atiquzzaman   Bandwidth-adaptive partitioning for
                                  distributed execution optimization of
                                  mobile applications  . . . . . . . . . . 334--347
             Binh Viet Phan and   
                   Eric Pardede   Active XML (AXML) research: Survey on
                                  the representation, system architecture,
                                  data exchange mechanism and query
                                  evaluation . . . . . . . . . . . . . . . 348--364
           Harjit Pal Singh and   
            Sarabjeet Singh and   
                   J. Singh and   
                     S. A. Khan   VoIP: State of art for global
                                  connectivity --- a critical review . . . 365--379
             Saif Al-Sultan and   
          Moath M. Al-Doori and   
          Ali H. Al-Bayatti and   
                  Hussien Zedan   A comprehensive survey on vehicular Ad
                                  Hoc network  . . . . . . . . . . . . . . 380--392
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 38, Number ??, February, 2014

                  Ilsun You and   
            Marek R. Ogiela and   
                A. Min Tjoa and   
                   Dongwan Shin   Advanced technologies for homeland
                                  defense and security . . . . . . . . . . 1--2
           Leszek T. Lilien and   
          Lotfi ben Othmane and   
                Pelin Angin and   
             Andrew DeCarlo and   
              Raed M. Salih and   
                Bharat Bhargava   A simulation study of ad hoc networking
                                  of UAVs with opportunistic resource
                                  utilization networks . . . . . . . . . . 3--15
               Dongjin Choi and   
               Byeongkyu Ko and   
                 Heesun Kim and   
                     Pankoo Kim   Text analysis for detecting
                                  terrorism-related articles on the web    16--21
        Aniello Castiglione and   
          Roberto De Prisco and   
          Alfredo De Santis and   
                  Ugo Fiore and   
             Francesco Palmieri   A botnet-based command and control
                                  approach relying on swarm intelligence   22--33
               Lidia Ogiela and   
                Marek R. Ogiela   Cognitive systems and bio-inspired
                                  computing in homeland security . . . . . 34--42
             Seung-Hyun Seo and   
                Aditi Gupta and   
       Asmaa Mohamed Sallam and   
              Elisa Bertino and   
                    Kangbin Yim   Detecting mobile malware threats to
                                  homeland security through static
                                  analysis . . . . . . . . . . . . . . . . 43--53
                Kerem Irgan and   
           Cem Ünsalan and   
                 Sebnem Baydere   Low-cost prioritization of image blocks
                                  in wireless sensor networks for border
                                  surveillance . . . . . . . . . . . . . . 54--64
             Luigi Catuogno and   
             Hans Löhr and   
             Marcel Winandy and   
             Ahmad-Reza Sadeghi   A trusted versioning file system for
                                  passive mobile storage devices . . . . . 65--75
                    Zang Li and   
             Chao-Hsien Chu and   
                        Wen Yao   A semantic authorization model for
                                  pervasive healthcare . . . . . . . . . . 76--87
               Hsing-Chung Chen   A multi-issued tag key agreement with
                                  time constraint for homeland defense
                                  sub-department in NFC environment  . . . 88--98
             Jong-Yeon Park and   
               Dong-Guk Han and   
                  Okyeon Yi and   
                  JeongNyeo Kim   An improved side channel attack using
                                  event information of subtraction . . . . 99--105
               Subir Halder and   
                  Sipra Das Bit   Enhancement of wireless sensor network
                                  lifetime by deploying heterogeneous
                                  nodes  . . . . . . . . . . . . . . . . . 106--124
                  Sheng Gao and   
                Jianfeng Ma and   
                   Cong Sun and   
                     Xinghua Li   Balancing trajectory privacy and data
                                  utility using a personalized
                                  anonymization model  . . . . . . . . . . 125--134
         Gaya K. Jayasinghe and   
         J. Shane Culpepper and   
                   Peter Bertok   Efficient and effective realtime
                                  prediction of drive-by download attacks  135--149
                Hai Van Luu and   
                    Xueyan Tang   An efficient algorithm for scheduling
                                  sensor data collection through
                                  multi-path routing structures  . . . . . 150--162
      Mohammad Doraghinejad and   
    Hossein Nezamabadi-pour and   
                     Ali Mahani   Channel assignment in multi-radio
                                  wireless mesh networks using an improved
                                  gravitational search algorithm . . . . . 163--171
            Messaoud Doudou and   
            Djamel Djenouri and   
             Nadjib Badache and   
        Abdelmadjid Bouabdallah   Synchronous contention-based MAC
                                  protocols for delay-sensitive wireless
                                  sensor networks: a review and taxonomy   172--184
                Wenjing Guo and   
                      Wei Zhang   A survey on intelligent routing
                                  protocols in wireless sensor networks    185--201
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 39, Number ??, March, 2014

Hélder Pereira Borges and   
José Neuman de Souza and   
              Bruno Schulze and   
           Antonio Roberto Mury   Automatic services instantiation based
                                  on a process specification . . . . . . . 1--16
       Ali Mohammed Alsahag and   
       Borhanuddin Mohd Ali and   
       Nor Kamariah Noordin and   
                Hafizal Mohamad   Fair uplink bandwidth allocation and
                                  latency guarantee for mobile WiMAX using
                                  fuzzy adaptive deficit round robin . . . 17--25
             Ding-Jie Huang and   
                 Wei-Chung Teng   A defense against clock skew replication
                                  attacks in wireless sensor networks  . . 26--37
                Endong Tong and   
                 Wenjia Niu and   
                    Gang Li and   
                  Ding Tang and   
                Liang Chang and   
               Zhongzhi Shi and   
                        Song Ci   Bloom filter-based workflow management
                                  to enable QoS guarantee in wireless
                                  sensor networks  . . . . . . . . . . . . 38--51
             Feng-Ming Yang and   
               Wei-Mei Chen and   
                Jean-Lien C. Wu   A dynamic strategy for packet scheduling
                                  and bandwidth allocation based on
                                  channel quality in IEEE 802.16e OFDMA
                                  system . . . . . . . . . . . . . . . . . 52--60
              Zhaolong Ning and   
              Qingyang Song and   
                 Yang Huang and   
                        Lei Guo   A channel estimation based opportunistic
                                  scheduling scheme in wireless
                                  bidirectional networks . . . . . . . . . 61--69
                Haidar Safa and   
             Wassim El-Hajj and   
                  Hanan Zoubian   A robust topology control solution for
                                  the sink placement problem in WSNs . . . 70--82
                 Yuxin Meng and   
                   Lam-For Kwok   Adaptive blacklist-based packet filter
                                  with a statistic-based approach in
                                  network intrusion detection  . . . . . . 83--92
         Smitha Shivshankar and   
               Abbas Jamalipour   Spatio-temporal multicast grouping for
                                  content-based routing in vehicular
                                  networks: a distributed approach . . . . 93--103
              Huailiang Tan and   
              Lianjun Huang and   
                 Zaihong He and   
                  Youyou Lu and   
                       Xubin He   DMVL: an I/O bandwidth dynamic
                                  allocation method for virtual networks   104--116
              Ali Moussaoui and   
           Fouzi Semchedine and   
             Abdallah Boukerram   A link-state QoS routing protocol based
                                  on link stability for Mobile Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 117--125
      Abderrahim Benslimane and   
             Abderrezak Rachedi   Rate adaptation scheme for IEEE
                                  802.11-based MANETs  . . . . . . . . . . 126--139
               V. R. Budyal and   
                    S. S. Manvi   ANFIS and agent based bandwidth and
                                  delay aware anycast routing in mobile ad
                                  hoc networks . . . . . . . . . . . . . . 140--151
                Wiem Tounsi and   
      Nora Cuppens-Boulahia and   
      Joaquin Garcia-Alfaro and   
          Yannick Chevalier and   
 Frédéric Cuppens   KEDGEN2: a key establishment and
                                  derivation protocol for EPC Gen2 RFID
                                  systems  . . . . . . . . . . . . . . . . 152--166
           Aukrit Chadagorn and   
             Ibrahim Khalil and   
              Conor Cameron and   
                     Zahir Tari   PileCast: Multiple bit rate live video
                                  streaming over BitTorrent  . . . . . . . 167--178
        Osama Al-Haj Hassan and   
           Thamer Al-Rousan and   
             Anas Abu Taleb and   
                     Adi Maaita   An efficient and scalable ranking
                                  technique for mashups involving RSS data
                                  sources  . . . . . . . . . . . . . . . . 179--190
             Ousmane Diallo and   
    Joel J. P. C. Rodrigues and   
                 Mbaye Sene and   
                   Jaime Lloret   Simulation framework for real-time
                                  database on WSNs . . . . . . . . . . . . 191--201
              Tien-Wen Sung and   
                  Chu-Sing Yang   Voronoi-based coverage improvement
                                  approach for wireless directional sensor
                                  networks . . . . . . . . . . . . . . . . 202--213
          Carlo Mastroianni and   
               Giuseppe Papuzzo   A self-organizing P2P framework for
                                  collective service discovery . . . . . . 214--222
              Younghyun Kim and   
                  Haneul Ko and   
              Sangheon Pack and   
             Jong-Hyouk Lee and   
               Seok-Joo Koh and   
                  Heeyoung Jung   Performance analysis of distributed
                                  mapping system in ID/locator separation
                                  architectures  . . . . . . . . . . . . . 223--232
              J. R. Gisbert and   
                   C. Palau and   
                 M. Uriarte and   
                  G. Prieto and   
       J. A. Palazón and   
                  M. Esteve and   
            O. López and   
                 J. Correas and   
   M. C. Lucas-Estañ and   
          P. Giménez and   
                  A. Moyano and   
               L. Collantes and   
         J. Gozálvez and   
                  B. Molina and   
           O. Lázaro and   
             A. González   Integrated system for control and
                                  monitoring industrial wireless networks
                                  for labor risk prevention  . . . . . . . 233--252
       Alper Rifat Ulucinar and   
          Ibrahim Korpeoglu and   
                  Ezhan Karasan   Effects of physical channel separation
                                  on application flows in a multi-radio
                                  multi-hop wireless mesh network: an
                                  experimental study on BilMesh testbed    253--265
         Mahantesh N. Birje and   
        Sunilkumar S. Manvi and   
                   Sajal K. Das   Reliable resources brokering scheme in
                                  wireless grids based on non-cooperative
                                  bargaining game  . . . . . . . . . . . . 266--279
                  Shilei Lu and   
                   Shunzheng Yu   A fuzzy $k$-coverage approach for RFID
                                  network planning using plant growth
                                  simulation algorithm . . . . . . . . . . 280--291
                      Jenn Tang   Designing an Anti-swindle Mahjong
                                  Leisure Prototype System using RFID and
                                  ontology theory  . . . . . . . . . . . . 292--301
                Qaisar Ayub and   
               Sulma Rashid and   
       M. Soperi Mohd Zahid and   
           Abdul Hanan Abdullah   Contact quality based forwarding
                                  strategy for delay tolerant network  . . 302--309
                  Xuxun Liu and   
                        Desi He   Ant colony optimization with greedy
                                  migration mechanism for node deployment
                                  in wireless sensor networks  . . . . . . 310--318
           Damianos Gavalas and   
Charalampos Konstantopoulos and   
      Konstantinos Mastakas and   
              Grammati Pantziou   Mobile recommender systems in tourism    319--333
          M. S. Kakkasageri and   
                    S. S. Manvi   Information management in vehicular ad
                                  hoc networks: a review . . . . . . . . . 334--350
               Hero Modares and   
Amirhossein Moravejosharieh and   
               Jaime Lloret and   
                   Rosli Salleh   A survey of secure protocols in Mobile
                                  IPv6 . . . . . . . . . . . . . . . . . . 351--368
    Muhammad Nouman Durrani and   
               Jawwad A. Shamsi   Volunteer computing: requirements,
                                  challenges, and solutions  . . . . . . . 369--380
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 40, Number ??, April, 2014

                  Jine Tang and   
             ZhangBing Zhou and   
                Jianwei Niu and   
                       Qun Wang   An energy efficient hierarchical
                                  clustering index tree for facilitating
                                  time-correlated region queries in the
                                  Internet of Things . . . . . . . . . . . 1--11
           Francisco Fraile and   
             Juan Carlos Guerri   Simple models of the content duration
                                  and the popularity of television content 12--20
                 Haiyang Hu and   
                  Yizhi Ren and   
                      Xu Xu and   
                Liguo Huang and   
                         Hua Hu   Reducing view inconsistency by
                                  predicting avatars' motion in
                                  multi-server distributed virtual
                                  environments . . . . . . . . . . . . . . 21--30
         Vijay Varadharajan and   
                 Udaya Tupakula   Counteracting security attacks in
                                  virtual machines in the cloud using
                                  property based attestation . . . . . . . 31--45
           Leili Farzinvash and   
                  Mehdi Dehghan   Multi-rate multicast routing in
                                  multi-gateway multi-channel multi-radio
                                  wireless mesh networks . . . . . . . . . 46--60
              Peng-Yeng Yin and   
               Ray-I. Chang and   
           Chih-Chiang Chao and   
                   Yen-Ting Chu   Niched ant colony optimization with
                                  colony guides for QoS multicast routing  61--72
                Mohsen Arab and   
               Mohsen Afsharchi   Community detection in social networks
                                  using hybrid merging of sub-communities  73--84
       Mohamed Ahmed Elfaki and   
            Hamidah Ibrahim and   
                  Ali Mamat and   
             Mohamed Othman and   
                    Haidar Safa   Collaborative caching priority for
                                  processing requests in MANETs  . . . . . 85--96
               Jianwei Wang and   
                 Chen Jiang and   
                   Jianfei Qian   Robustness of Internet under targeted
                                  attack: a cascading failure perspective  97--104
                Sehoon Park and   
                Qichen Chen and   
                  Hyuck Han and   
                   Heon Y. Yeom   Design and evaluation of mobile
                                  offloading system for web-centric
                                  devices  . . . . . . . . . . . . . . . . 105--115
                  Peng Zhao and   
                 Xinyu Yang and   
                     Wei Yu and   
               Chiyong Dong and   
                Shusen Yang and   
               Sulabh Bhattarai   Toward efficient estimation of available
                                  bandwidth for IEEE 802.11-based wireless
                                  networks . . . . . . . . . . . . . . . . 116--125
                   Yang Xia and   
                  Chai Kiat Yeo   Mobile Internet access over intermittent
                                  network connectivity . . . . . . . . . . 126--138
                 Zhen-Yu Wu and   
                Ju-Chuan Wu and   
            Sung-Chiang Lin and   
                 Charlotte Wang   An electronic voting mechanism for
                                  fighting bribery and coercion  . . . . . 139--150
            Samar Abdelaziz and   
               Mustafa ElNainay   Metric-based taxonomy of routing
                                  protocols for cognitive radio ad hoc
                                  networks . . . . . . . . . . . . . . . . 151--163
                Onur Yilmaz and   
           Orhan Dagdeviren and   
                 Kayhan Erciyes   Localization-free and energy-efficient
                                  hole bypassing techniques for
                                  fault-tolerant sensor networks . . . . . 164--178
               Darren Quick and   
         Kim-Kwang Raymond Choo   Google Drive: Forensic analysis of data
                                  remnants . . . . . . . . . . . . . . . . 179--193

Journal of Network and Computer Applications
Volume 40, Number 0, April, 2014

              Laleh Arshadi and   
          Amir Hossein Jahangir   Benford's law behavior of Internet
                                  traffic  . . . . . . . . . . . . . . . . 194--205

Journal of Network and Computer Applications
Volume 40, Number ??, April, 2014

              Lingfang Zeng and   
                      Yang Wang   Optimization on content service with
                                  local search in cloud of clouds  . . . . 206--215
                      Ke Li and   
                 Sheng Wang and   
                Shizhong Xu and   
                 Xiong Wang and   
               Haojun Huang and   
                    Jin Ren and   
                        Bo Zhai   Evaluating the benefit of the core-edge
                                  separation on intradomain traffic
                                  engineering under uncertain traffic
                                  demand . . . . . . . . . . . . . . . . . 216--226
               Hyun-Ho Choi and   
                  Ki-Ho Lee and   
                  Jung-Ryun Lee   Energy-delay tradeoff analysis of user
                                  state transition mechanism for mobile
                                  web services . . . . . . . . . . . . . . 227--233
                Xinjie Guan and   
                Baek-Young Choi   Push or pull? Toward optimal content
                                  delivery using cloud storage . . . . . . 234--243
      Francisco Macia-Perez and   
       Iren Lorenzo-Fonseca and   
    Jose Vicente Berna-Martinez   A formal framework for modelling complex
                                  network management systems . . . . . . . 255--269
               Carlos Abreu and   
             Manuel Ricardo and   
                   P. M. Mendes   Energy-aware routing for biomedical
                                  wireless sensor networks . . . . . . . . 270--278
              R. I. Ciobanu and   
                D. G. Reina and   
                   C. Dobre and   
                S. L. Toral and   
                     P. Johnson   JDER: a history-based forwarding scheme
                                  for delay tolerant networks using
                                  Jaccard distance and encountered ration  279--291
               Dingde Jiang and   
              Zhengzheng Xu and   
                 Peng Zhang and   
                       Ting Zhu   A transform domain-based anomaly
                                  detection approach to network-wide
                                  traffic  . . . . . . . . . . . . . . . . 292--306
                   N. Hoque and   
          Monowar H. Bhuyan and   
              R. C. Baishya and   
        D. K. Bhattacharyya and   
                   J. K. Kalita   Network attacks: Taxonomy, tools and
                                  systems  . . . . . . . . . . . . . . . . 307--324
            Md Whaiduzzaman and   
              Mehdi Sookhak and   
              Abdullah Gani and   
                 Rajkumar Buyya   A survey on vehicular cloud computing    325--344
            Saeid Abolfazli and   
              Zohreh Sanaei and   
              Abdullah Gani and   
                   Feng Xia and   
               Laurence T. Yang   Rich Mobile Applications: Genesis,
                                  taxonomy, and open issues  . . . . . . . 345--362
            Baraa T. Sharef and   
           Raed A. Alsaqour and   
                 Mahamod Ismail   Vehicular communication ad hoc routing
                                  protocols: a survey  . . . . . . . . . . 363--396
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 41, Number ??, May, 2014

          Dhiah Al-Shammary and   
             Ibrahim Khalil and   
                     Zahir Tari   A distributed aggregation and fast
                                  fractal clustering approach for SOAP
                                  traffic  . . . . . . . . . . . . . . . . 1--14
                    Tao Qin and   
              Xiaohong Guan and   
                     Wei Li and   
               Pinghui Wang and   
                        Min Zhu   A new connection degree calculation and
                                  measurement method for large scale
                                  network monitoring . . . . . . . . . . . 15--26
                Gurkan Tuna and   
                Bilel Nefzi and   
                Gianpaolo Conte   Unmanned aerial vehicle-aided
                                  communications system for disaster
                                  recovery . . . . . . . . . . . . . . . . 27--36
                  Lijun Gao and   
                   Maode Ma and   
                 Yantai Shu and   
                      Yuhua Wei   An ultralightweight RFID authentication
                                  protocol with CRC and permutation  . . . 37--46
                  Tin-Yu Wu and   
              Wei-Tsong Lee and   
              Nadra Guizani and   
                  Tzu-Ming Wang   Incentive mechanism for P2P file sharing
                                  based on social network and game theory  47--55
           Ricardo Anacleto and   
            Lino Figueiredo and   
                Ana Almeida and   
                   Paulo Novais   Mobile application to provide
                                  personalized sightseeing tours . . . . . 56--64
         J. J. Castro-Schez and   
              M. A. Redondo and   
                  F. Jurado and   
                     J. Albusac   Experience applying language processing
                                  techniques to develop educational
                                  software that allow active learning
                                  methodologies by advising students . . . 65--79
       Ahmed Mohammed Abbas and   
        Azuraliza Abu Bakar and   
              Mohd Zakree Ahmad   Fast dynamic clustering SOAP messages
                                  based compression and aggregation model
                                  for enhanced performance of Web services 80--88
             Bhaskar Sardar and   
              Debashis Saha and   
                  Mahbub Hassan   A novel enhancement of TCP for on-board
                                  IP networks with wireless cellular
                                  connectivity . . . . . . . . . . . . . . 89--100
                    Wei Liu and   
                     Wei Du and   
                  Jing Chen and   
                   Wei Wang and   
                    GuoSun Zeng   Adaptive energy-efficient scheduling
                                  algorithm for parallel tasks on
                                  homogeneous clusters . . . . . . . . . . 101--113
                Jinzhu Wang and   
               Jianxin Liao and   
                Tonghong Li and   
                  Jing Wang and   
                Jingyu Wang and   
                          Qi Qi   Probe-based end-to-end overload control
                                  for networks of SIP servers  . . . . . . 114--125
     Giannis Haralabopoulos and   
        Ioannis Anagnostopoulos   Real time enhanced random sampling of
                                  online social networks . . . . . . . . . 126--134
             Saleh Alghamdi and   
           Ron van Schyndel and   
                 Ibrahim Khalil   Accurate positioning using long range
                                  active RFID technology to assist
                                  visually impaired people . . . . . . . . 135--147
                Yacine Atif and   
                    Liren Zhang   Network resource management in support
                                  of QoS in ubiquitous learning  . . . . . 148--156
                Xiaoyuan Li and   
               Dexiang Wang and   
              Janise McNair and   
                   Jianmin Chen   Dynamic spectrum access with packet size
                                  adaptation and residual energy balancing
                                  for energy-constrained cognitive radio
                                  sensor networks  . . . . . . . . . . . . 157--166
      Muhammad Hamad Alizai and   
                   Klaus Wehrle   Probabilistic location-free addressing
                                  in wireless networks . . . . . . . . . . 167--181
            Sergio Pastrana and   
             Agustin Orfila and   
           Juan E. Tapiador and   
              Pedro Peris-Lopez   Randomized Anagram revisited . . . . . . 182--196
                Tahir Ahmad and   
                   Usman Younis   Randomness testing of non-cryptographic
                                  hash functions for real-time hash table
                                  based storage and look-up of URLs  . . . 197--205
               Tim Verbelen and   
             Pieter Simoens and   
             Filip De Turck and   
                    Bart Dhoedt   Adaptive deployment and configuration
                                  for mobile augmented reality in the
                                  cloudlet . . . . . . . . . . . . . . . . 206--216
          M. A. Raayatpanah and   
        H. Salehi Fathabadi and   
               B. H. Khalaj and   
              S. Khodayifar and   
                 P. M. Pardalos   Bounds on end-to-end statistical delay
                                  and jitter in multiple multicast coded
                                  packet networks  . . . . . . . . . . . . 217--227
         Bert Vankeirsbilck and   
             Pieter Simoens and   
             Filip De Turck and   
             Piet Demeester and   
                    Bart Dhoedt   Network latency hiding in thin client
                                  systems through server-centric
                                  speculative display updating . . . . . . 228--239
          Radu-Ioan Ciobanu and   
              Ciprian Dobre and   
              Mihai Dascalu and   
        Stefan Trausan-Matu and   
               Valentin Cristea   SENSE: a collaborative selfish node
                                  detection and incentive mechanism for
                                  opportunistic networks . . . . . . . . . 240--249
                 Thang Tran and   
              Maike Kuhnert and   
             Christian Wietfeld   Cloud voice service as over-the-top
                                  solution for seamless voice call
                                  continuity in a heterogeneous network
                                  environment  . . . . . . . . . . . . . . 250--262
                   Yusen Li and   
                    Wentong Cai   Update schedules for improving
                                  consistency in multi-server distributed
                                  virtual environments . . . . . . . . . . 263--273
                     Fan Li and   
               Jinsheng Sun and   
             Moshe Zukerman and   
               Zhengfei Liu and   
                     Qin Xu and   
                 Sammy Chan and   
              Guanrong Chen and   
                    King-Tim Ko   A comparative simulation study of
                                  TCP/AQM systems for evaluating the
                                  potential of neuron-based AQM schemes    274--299
            Govind P. Gupta and   
                Manoj Misra and   
                    Kumkum Garg   Energy and trust aware mobile agent
                                  migration protocol for data aggregation
                                  in wireless sensor networks  . . . . . . 300--311
              Mehrnaz Moudi and   
                 Mohamed Othman   A GreedyZero algorithm to minimise the
                                  conflicts in an Optical Multistage
                                  Interconnection Network  . . . . . . . . 312--318
  Álvaro Rubio-Largo and   
Miguel A. Vega-Rodríguez and   
David L. González-Álvarez   Performance assessment of multiobjective
                                  approaches in optical Traffic Grooming   319--350
                      Li Yi and   
               Huachun Zhou and   
              Daochao Huang and   
                   Hongke Zhang   An analytical study of distributed
                                  mobility management schemes with a flow
                                  duration based model . . . . . . . . . . 351--357
              Lingfang Zeng and   
       Bharadwaj Veeravalli and   
                   Qingsong Wei   Space4time: Optimization
                                  latency-sensitive content service in
                                  cloud  . . . . . . . . . . . . . . . . . 358--368
             Satoshi Utsumi and   
Salahuddin Muhammad Salim Zabir   A new high-performance TCP friendly
                                  congestion control over wireless
                                  networks . . . . . . . . . . . . . . . . 369--378
              Qingyang Song and   
              Zhaolong Ning and   
                 Yang Huang and   
                    Lei Guo and   
                    Xiaobing Lu   Joint power control and spectrum access
                                  in cognitive radio networks  . . . . . . 379--388
     Nima Jafari Navimipour and   
        Amir Masoud Rahmani and   
      Ahmad Habibizad Navin and   
             Mehdi Hosseinzadeh   Resource discovery mechanisms in grid
                                  systems: a survey  . . . . . . . . . . . 389--410
                    Ying Li and   
                   Radim Bartos   A survey of protocols for Intermittently
                                  Connected Delay-Tolerant Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 411--423
        Sunilkumar S. Manvi and   
            Gopal Krishna Shyam   Resource management for Infrastructure
                                  as a Service (IaaS) in cloud computing:
                                  a survey . . . . . . . . . . . . . . . . 424--440
               Ssu-Hsuan Lu and   
              Kuan-Ching Li and   
              Kuan-Chou Lai and   
                Yeh-Ching Chung   Effectiveness of a replica mechanism to
                                  improve availability with Arrangement
                                  Graph-Based Overlay  . . . . . . . . . . 441--450
         Abderrazak Abdaoui and   
              Tarek M. El-Fouly   TOSSIM and distributed binary consensus
                                  algorithm in wireless sensor networks    451--458
              R. Q. Shaddad and   
             A. B. Mohammad and   
           S. A. Al-Gailani and   
             A. M. Al-hetar and   
                M. A. Elmagzoub   A survey on access technologies for
                                  broadband optical and wireless networks  459--472
        Ayesha Binte Ashfaq and   
               Sajjad Rizvi and   
                Mobin Javed and   
            Syed Ali Khayam and   
         Muhammad Qasim Ali and   
                  Ehab Al-Shaer   Information theoretic feature space
                                  slicing for statistical anomaly
                                  detection  . . . . . . . . . . . . . . . 473--487
              Ratnadip Adhikari   A meticulous study of various medium
                                  access control protocols for wireless
                                  sensor networks  . . . . . . . . . . . . 488--504
      Jesús Friginal and   
           Juan-Carlos Ruiz and   
     David de Andrés and   
                 Antonio Bustos   Ambient noise in wireless mesh networks:
                                  Evaluation and proposal of an adaptive
                                  algorithm to mitigate link removal . . . 505--516
             Shazana Md Zin and   
           Nor Badrul Anuar and   
        Miss Laiha Mat Kiah and   
           Al-Sakib Khan Pathan   Routing protocol design for secure WSN:
                                  Review and open research issues  . . . . 517--530
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 42, Number ??, June, 2014

                Jinyuan Jia and   
                   Wei Wang and   
                    Xiaojun Hei   An efficient caching algorithm for
                                  peer-to-peer $3$D streaming in
                                  distributed virtual environments . . . . 1--11
                     Qin Xu and   
                   Jinsheng Sun   A simple active queue management based
                                  on the prediction of the packet arrival
                                  rate . . . . . . . . . . . . . . . . . . 12--20
        Mehdi Naderi Soorki and   
                  Habib Rostami   Label switched protocol routing with
                                  guaranteed bandwidth and end to end path
                                  delay in MPLS networks . . . . . . . . . 21--38
        Víctor Mateu and   
       Francesc Sebé and   
                    Magda Valls   Constructing credential-based E-voting
                                  systems from offline E-coin protocols    39--44
            Poria Pirozmand and   
                  Guowei Wu and   
             Behrouz Jedari and   
                       Feng Xia   Human mobility in opportunistic
                                  networks: Characteristics, models and
                                  prediction methods . . . . . . . . . . . 45--58
           Abbas Mehdizadeh and   
       Fazirulhisyam Hashim and   
                 Mohamed Othman   Lightweight decentralized
                                  multicast-unicast key management method
                                  in wireless IPv6 networks  . . . . . . . 59--69
               Guangjie Han and   
                   Jia Chao and   
               Chenyu Zhang and   
                    Lei Shu and   
                      Qingwu Li   The impacts of mobility models on DV-hop
                                  based localization in Mobile Wireless
                                  Sensor Networks  . . . . . . . . . . . . 70--79
             Hadi Shakibian and   
    Nasrollah Moghadam Charkari   In-cluster vector evaluated particle
                                  swarm optimization for distributed
                                  regression in WSNs . . . . . . . . . . . 80--91
              Nadine Akkari and   
           Ghadah Aldabbagh and   
               Michel Nahas and   
                    John Cioffi   Dynamic Clustering Protocol for
                                  coordinated tethering over cellular
                                  networks . . . . . . . . . . . . . . . . 92--101
   Shahaboddin Shamshirband and   
           Nor Badrul Anuar and   
        Miss Laiha Mat Kiah and   
            Vala Ali Rohani and   
         Dalibor Petkovi\'c and   
               Sanjay Misra and   
               Abdul Nasir Khan   Co-FAIS: Cooperative fuzzy artificial
                                  immune system for detecting intrusion in
                                  wireless sensor networks . . . . . . . . 102--117
Jordán Pascual Espada and   
            Ronald R. Yager and   
                        Bin Guo   Internet of Things: Smart things network
                                  and communication  . . . . . . . . . . . 118--119
                  Zheng Yan and   
                 Peng Zhang and   
        Athanasios V. Vasilakos   A survey on trust management for
                                  Internet of Things . . . . . . . . . . . 120--134
                    Wei Xie and   
                    Lei Xie and   
                 Chen Zhang and   
                 Qiang Wang and   
                    Jian Xu and   
                 Quan Zhang and   
                  Chaojing Tang   RFID seeking: Finding a lost tag rather
                                  than only detecting its missing  . . . . 135--142
                  Lianbo Ma and   
                 Kunyuan Hu and   
                Yunlong Zhu and   
                   Hanning Chen   Cooperative artificial bee colony
                                  algorithm for multi-objective RFID
                                  network planning . . . . . . . . . . . . 143--162
             Hicham Lakhlef and   
                Hakim Mabed and   
               Julien Bourgeois   Optimization of the logical topology for
                                  mobile MEMS networks . . . . . . . . . . 163--177
  Guillermo Cueva-Fernandez and   
Jordán Pascual Espada and   
Vicente García-Díaz and   
Cristian González García and   
        Nestor Garcia-Fernandez   Vitruvius: an expert system for vehicle
                                  sensor tracking and managing application
                                  generation . . . . . . . . . . . . . . . 178--188
                 Jiajun Sun and   
                     Huadong Ma   Heterogeneous-belief based incentive
                                  schemes for crowd sensing in mobile
                                  social networks  . . . . . . . . . . . . 189--196
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 43, Number ??, August, 2014

               Yasir Saleem and   
        Mubashir Husain Rehmani   Primary radio user activity models for
                                  cognitive radio networks: a survey . . . 1--16
                    Dong Ma and   
                       Maode Ma   Network selection and resource
                                  allocation for multicast in HetNets  . . 17--26
                 Gongqi Lin and   
                Sieteng Soh and   
               Kwan-Wu Chin and   
                Mihai Lazarescu   Energy Aware Two Disjoint Paths Routing  27--41
                   Zheng Xu and   
                Yunhuai Liu and   
                    Lin Mei and   
               Chuanping Hu and   
                       Lan Chen   Generating temporal semantic context of
                                  concepts using web search engines  . . . 42--55
                  JuiHsi Fu and   
                PoChing Lin and   
                   SingLing Lee   Detecting spamming activities in a
                                  campus network using incremental
                                  learning . . . . . . . . . . . . . . . . 56--65
         Mohamed A. Alrshah and   
             Mohamed Othman and   
            Borhanuddin Ali and   
             Zurina Mohd Hanapi   Comparative study of high-speed Linux
                                  TCP variants over high-BDP networks  . . 66--75
                Xiaoping Wu and   
               GuoYing Wang and   
                    Dan Dai and   
                   Mengjun Tong   Accurate acoustic energy-based
                                  localization with beacon position
                                  uncertainty in wireless sensor networks  76--83
              Abdullah Gani and   
      Golam Mokatder Nayeem and   
            Muhammad Shiraz and   
              Mehdi Sookhak and   
            Md Whaiduzzaman and   
                   Suleman Khan   A review on interworking and mobility
                                  techniques for seamless connectivity in
                                  mobile cloud computing . . . . . . . . . 84--102
           Eduardo da Silva and   
          Luiz Carlos P. Albini   Middleware proposals for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 103--120
              Mehdi Sookhak and   
             Hamid Talebian and   
                 Ejaz Ahmed and   
              Abdullah Gani and   
          Muhammad Khurram Khan   A review on remote data auditing in
                                  single cloud server: Taxonomy and open
                                  issues . . . . . . . . . . . . . . . . . 121--141
             Hui-Shyong Yeo and   
            Xiao-Shen Phang and   
               Hoon-Jae Lee and   
                    Hyotaek Lim   Leveraging client-side storage
                                  techniques for enhanced use of multiple
                                  consumer cloud storage services on
                                  resource-constrained mobile devices  . . 142--156
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 44, Number ??, September, 2014

   Mohammad Reza Jabbarpour and   
            Rafidah Md Noor and   
      Rashid Hafeez Khokhar and   
                   Chih-Heng Ke   Cross-layer congestion control model for
                                  urban vehicular environments . . . . . . 1--16
                   Jiyan Wu and   
                   Bo Cheng and   
               Yanlei Shang and   
                  Jun Huang and   
                  Junliang Chen   A novel scheduling approach to
                                  concurrent multipath transmission of
                                  high definition video in overlay
                                  networks . . . . . . . . . . . . . . . . 17--29
               Amr El Mougy and   
               Aymen Kamoun and   
           Mohamed Ibnkahla and   
               Sa\"\id Tazi and   
                   Khalil Drira   A context and application-aware
                                  framework for resource management in
                                  dynamic collaborative wireless M2M
                                  networks . . . . . . . . . . . . . . . . 30--45
              Anindya Iqbal and   
                 Manzur Murshed   On demand-driven movement strategy for
                                  moving beacons in sensor localization    46--62
              Guo-Song Tian and   
                Yu-Chu Tian and   
                    Colin Fidge   Precise relative clock synchronization
                                  for distributed control using TSC
                                  registers  . . . . . . . . . . . . . . . 63--71
Víctor Fernández and   
  Juan Manuel Orduña and   
                  Pedro Morillo   Server implementations for improving the
                                  performance of CAR systems based on
                                  mobile phones  . . . . . . . . . . . . . 72--82
        Khairul Azami Sidek and   
                     Vu Mai and   
                 Ibrahim Khalil   Data mining in mobile ECG based
                                  biometric identification . . . . . . . . 83--91
              Guoxing Jiang and   
                   Jun Chen and   
                   Yanqing Shen   Delivery ratio- and buffered
                                  time-constrained: Multicasting for Delay
                                  Tolerant Networks  . . . . . . . . . . . 92--105
               Ying-Dar Lin and   
            Ekarat Rattagan and   
             Yuan-Cheng Lai and   
               Li-Pin Chang and   
               Yun-Chien Yo and   
              Cheng-Yuan Ho and   
                 Shun-Lee Chang   Calibrating parameters and formulas for
                                  process-level energy consumption
                                  profiling in smartphones . . . . . . . . 106--119
                 Wenjia Niu and   
                    Gang Li and   
                Endong Tong and   
              Quan Z. Sheng and   
                    Qian Li and   
                     Yue Hu and   
    Athanasios V. Vasilakos and   
                         Li Guo   A block-aware hybrid data dissemination
                                  with hotspot elimination in wireless
                                  sensor network . . . . . . . . . . . . . 120--133
              Hassina Nacer and   
                 Djamil Aissani   Semantic web services: Standards,
                                  applications, challenges and solutions   134--151
                Weiwei Fang and   
                  Zhulin An and   
                    Lei Shu and   
                 Qingyu Liu and   
                 Yongjun Xu and   
                        Yuan An   Achieving optimal admission control with
                                  dynamic scheduling in energy constrained
                                  network systems  . . . . . . . . . . . . 152--160
                   Jiyan Wu and   
               Yanlei Shang and   
                  Chau Yuen and   
                   Bo Cheng and   
                  Junliang Chen   TRADER: a reliable transmission scheme
                                  to video conferencing applications over
                                  the Internet . . . . . . . . . . . . . . 161--171
               Changqing Ji and   
                 Zhiyang Li and   
                   Wenyu Qu and   
                   Yujie Xu and   
                    Yuanyuan Li   Scalable nearest neighbor query
                                  processing based on Inverted Grid Index  172--182
             Shaahin Madani and   
                 Ibrahim Khalil   Garbled Routing (GR): a generic
                                  framework towards unification of
                                  anonymous communication systems  . . . . 183--195
            Pooia Lalbakhsh and   
               Bahram Zaeri and   
            Yi-Ping Phoebe Chen   Using Dead Ants to improve the
                                  robustness and adaptability of AntNet
                                  routing algorithm  . . . . . . . . . . . 196--211
                Sudip Misra and   
         P. Venkata Krishna and   
                 V. Saritha and   
            Harshit Agarwal and   
                   Aditya Ahuja   Learning automata-based
                                  multi-constrained fault-tolerance
                                  approach for effective energy management
                                  in smart grid communication network  . . 212--219
          Israat Tanzeena Haque   A sensor based indoor localization
                                  through fingerprinting . . . . . . . . . 220--229
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 45, Number ??, October, 2014

               Abbas Bradai and   
               Toufik Ahmed and   
              Raouf Boutaba and   
                     Reaz Ahmed   Efficient content delivery scheme for
                                  layered video streaming in large-scale
                                  networks . . . . . . . . . . . . . . . . 1--14
                Jenhui Chen and   
                Zhuxiu Yuan and   
                       Lei Wang   An apropos signal report and adaptive
                                  period (ASAP) scheme for fast handover
                                  in the fourth-generation wireless
                                  networks . . . . . . . . . . . . . . . . 15--26
                   An Huang and   
                        Bing Hu   The optimal joint sequence design in the
                                  feedback-based two-stage switch  . . . . 27--34
                  Jun Huang and   
                Guoquan Liu and   
                     Qiang Duan   On modeling and optimization for
                                  composite network-Cloud service
                                  provisioning . . . . . . . . . . . . . . 35--43
               Junaid Qadir and   
                 Adeel Baig and   
                   Asad Ali and   
               Quratulain Shafi   Multicasting in cognitive radio
                                  networks: Algorithms, techniques and
                                  protocols  . . . . . . . . . . . . . . . 44--61
           Vandana Kushwaha and   
               Ratneshwer Gupta   Congestion control for high-speed wired
                                  network: a systematic literature review  62--78
          Kok-Lim Alvin Yau and   
               Nordin Ramli and   
             Wahidah Hashim and   
                Hafizal Mohamad   Clustering algorithms for Cognitive
                                  Radio networks: a survey . . . . . . . . 79--95
   Mohammad Iftekhar Husain and   
               Steven Y. Ko and   
              Steve Uurtamo and   
                 Atri Rudra and   
             Ramalingam Sridhar   Bidirectional data verification for
                                  cloud storage  . . . . . . . . . . . . . 96--107
         Saurabh Kumar Garg and   
        Adel Nadjaran Toosi and   
 Srinivasa K. Gopalaiyengar and   
                 Rajkumar Buyya   SLA-based virtual machine management for
                                  heterogeneous workloads in a cloud
                                  datacenter . . . . . . . . . . . . . . . 108--120
                    Yan Zhu and   
                      Di Ma and   
                Changjun Hu and   
              Gail-Joon Ahn and   
                     Hongxin Hu   Secure and efficient random functions
                                  with variable-length output  . . . . . . 121--133
                     Le Sun and   
                   Hai Dong and   
    Farookh Khadeer Hussain and   
       Omar Khadeer Hussain and   
                Elizabeth Chang   Cloud service selection:
                                  State-of-the-art and future research
                                  directions . . . . . . . . . . . . . . . 134--150
             Gurpreet Singh and   
               Neeraj Kumar and   
               Anil Kumar Verma   ANTALG: an Innovative ACO based Routing
                                  Algorithm for MANETs . . . . . . . . . . 151--167
     Fatima Zohra Benhamida and   
             Yacine Challal and   
                 Mouloud Koudil   Adaptive failure detection in low power
                                  lossy wireless sensor networks . . . . . 168--180
                Julio Dondo and   
           Felix Villanueva and   
               David Garcia and   
              David Vallejo and   
       Carlos Glez-Morcillo and   
              Juan Carlos Lopez   Distributed FPGA-based architecture to
                                  support indoor localisation and
                                  orientation services . . . . . . . . . . 181--190
                 Rawya Rizk and   
                Walaa Saber and   
                      Hany Harb   Conditional clustered matrix
                                  factorization based network coordinate
                                  system . . . . . . . . . . . . . . . . . 191--202
         Masoume Jabbarifar and   
                Michel Dagenais   LIANA: Live incremental time
                                  synchronization of traces for
                                  distributed systems analysis . . . . . . 203--214
            Yosra Ben Saied and   
           Alexis Olivereau and   
           Djamal Zeghlache and   
               Maryline Laurent   A survey of collaborative services and
                                  security-related issues in modern
                                  wireless Ad-Hoc communications . . . . . 215--227
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 46, Number ??, November, 2014

           Ivanilton Polato and   
        Reginaldo Ré and   
            Alfredo Goldman and   
                      Fabio Kon   A comprehensive view of Hadoop research
                                  --- a systematic literature review . . . 1--25
            Hosein Mohamadi and   
         Shaharuddin Salleh and   
        Mohd Norsyarizad Razali   Heuristic methods to maximize network
                                  lifetime in directional sensor networks
                                  with adjustable sensing ranges . . . . . 26--35
      Farzaneh R. Armaghani and   
               Iqbal Gondal and   
        Joarder Kamruzzaman and   
                 David G. Green   Sensor selection for tracking multiple
                                  groups of targets  . . . . . . . . . . . 36--47
                   Congduc Pham   Communication performances of IEEE
                                  802.15.4 wireless sensor motes for
                                  data-intensive applications: a
                                  comparison of WaspMote, Arduino MEGA,
                                  TelosB, MicaZ and iMote2 for image
                                  surveillance . . . . . . . . . . . . . . 48--59
                Haidar Safa and   
               Marcel Karam and   
                  Bassam Moussa   PHAODV: Power aware heterogeneous
                                  routing protocol for MANETs  . . . . . . 60--71
                   Ning Liu and   
                Xiaoping Li and   
                   Weiming Shen   Multi-granularity resource
                                  virtualization and sharing strategies in
                                  cloud manufacturing  . . . . . . . . . . 72--82
              Tarek Khalifa and   
              Atef Abdrabou and   
       Khaled Bashir Shaban and   
            Maazen Alsabaan and   
               Kshirasagar Naik   Transport layer performance analysis and
                                  optimization for smart metering
                                  infrastructure . . . . . . . . . . . . . 83--93
                   Jing Qin and   
               Hongwei Duan and   
                Huawei Zhao and   
                     Jiankun Hu   A new Lagrange solution to the
                                  privacy-preserving general geometric
                                  intersection problem . . . . . . . . . . 94--99
             Omessaad Hamdi and   
      Mohamed Aymen Chalouf and   
           Dramane Ouattara and   
                 Francine Krief   eHealth: Survey on research projects,
                                  comparative study of telemonitoring
                                  architectures and main issues  . . . . . 100--112
               Vesal Hakami and   
                  Mehdi Dehghan   Efficient broadcasting in slow fading
                                  wireless ad-hoc networks . . . . . . . . 113--123
             Ing-Chau Chang and   
            Eric Jui-Lin Lu and   
           Shiuan-Yin Huang and   
                    Yi-Hui Chen   An RDF-based P2P overlay network
                                  supporting range and wildcard queries    124--138
           Kh Mahmudul Alam and   
        Joarder Kamruzzaman and   
              Gour Karmakar and   
                 Manzur Murshed   Dynamic adjustment of sensing range for
                                  event coverage in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 139--153
          Seytkamal Medetov and   
           Mohamed Bakhouya and   
               Jaafar Gaber and   
            Khalid Zinedine and   
                Maxime Wack and   
                  Pascal Lorenz   A decentralized approach for information
                                  dissemination in Vehicular Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 154--165
    Muhammad Zubair Farooqi and   
       Salma Malik Tabassum and   
    Mubashir Husain Rehmani and   
                   Yasir Saleem   A survey on network coding: From
                                  traditional wireless networks to
                                  emerging cognitive radio networks  . . . 166--181
          Cüneyt Sevgi and   
          Altan Koçyigit   Optimal deployment in randomly deployed
                                  heterogeneous WSNs: a connected coverage
                                  approach . . . . . . . . . . . . . . . . 182--197
             M. Mehdi Afsar and   
         Mohammad-H. Tayarani-N   Clustering in sensor networks: a
                                  literature survey  . . . . . . . . . . . 198--226
      Panayiotis G. Andreou and   
Demetrios Zeinalipour-Yazti and   
          George S. Samaras and   
           Panos K. Chrysanthis   A network-aware framework for
                                  energy-efficient data acquisition in
                                  wireless sensor networks . . . . . . . . 227--240
           David H. S. Lima and   
         Andre L. L. Aquino and   
            Heitor S. Ramos and   
          Eliana S. Almeida and   
        Joel J. P. C. Rodrigues   OASys: an opportunistic and agile system
                                  to detect free on-street parking using
                                  intelligent boards embedded in
                                  surveillance cameras . . . . . . . . . . 241--249
      Abderrahim Benslimane and   
                 Jiankun Hu and   
          Xuemin (Sherman) Shen   Special issue on ``Quality of service in
                                  wireless and mobile networking'' . . . . 250--251
            Meng-Shiuan Pan and   
                   Ping-Lin Liu   Low latency scheduling for convergecast
                                  in ZigBee tree-based wireless sensor
                                  networks . . . . . . . . . . . . . . . . 252--263
               Neeraj Kumar and   
            Sudhanshu Tyagi and   
                 Der-Jiunn Deng   LA-EEHSC: Learning automata-based energy
                                  efficient heterogeneous selective
                                  clustering for wireless sensor networks  264--279
               Adnan Shahid and   
               Saleem Aslam and   
             Hyung Seok Kim and   
                 Kyung-Geun Lee   Distributed joint resource and power
                                  allocation in self-organized femtocell
                                  networks: a potential game approach  . . 280--292
               Miloud Bagaa and   
             Mohamed Younis and   
             Adlen Ksentini and   
                 Nadjib Badache   Reliable multi-channel scheduling for
                                  timely dissemination of aggregated data
                                  in wireless sensor networks  . . . . . . 293--304
                 Peijian Ju and   
                   Wei Song and   
                 A-Long Jin and   
                     Dizhi Zhou   Performance analysis and enhancement for
                                  a cooperative wireless diversity network
                                  with spatially random mobile helpers . . 305--314
               Ruichun Tang and   
               Yuanzhen Yue and   
             Xiangqian Ding and   
                        Yue Qiu   Credibility-based cloud media resource
                                  allocation algorithm . . . . . . . . . . 315--321
               Li Jun Zhang and   
                  Samuel Pierre   An enhanced fast handover with seamless
                                  mobility support for next-generation
                                  wireless networks  . . . . . . . . . . . 322--335
                  K. Ivesic and   
            L. Skorin-Kapov and   
                 M. Matijasevic   Cross-layer QoE-driven admission control
                                  and resource allocation for adaptive
                                  multimedia services in LTE . . . . . . . 336--351
            Sonia Ben Rejeb and   
               Nidal Nasser and   
                   Sami Tabbane   A novel resource allocation scheme for
                                  LTE network in the presence of mobility  352--361
         Nourch\`ene Bradai and   
       Lamia Chaari Fourati and   
                   Lotfi Kamoun   Investigation and performance analysis
                                  of MAC protocols for WBAN networks . . . 362--373
            Jacques M. Bahi and   
          Christophe Guyeux and   
               Mourad Hakem and   
               Abdallah Makhoul   Epidemiological approach for data
                                  survivability in unattended wireless
                                  sensor networks  . . . . . . . . . . . . 374--383
                    Zhi Liu and   
               Jingyun Feng and   
                 Yusheng Ji and   
                 Yongbing Zhang   EAF: Energy-aware adaptive free
                                  viewpoint video wireless transmission    384--394
         Abderrezak Rachedi and   
                Hakim Badis and   
          Abderrahim Benslimane   How MIMO cross-layer design enables QoS
                                  while detecting non-cooperative nodes in
                                  wireless multi-hop networks  . . . . . . 395--406
                  Tao Huang and   
                  Baoliu Ye and   
                   Song Guo and   
                      Sanglu Lu   Delay minimization by exploring
                                  full-duplex capacity and relay-based
                                  cooperative scheduling in WLANs  . . . . 407--417
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 47, Number ??, January, 2015

              Ali Moussaoui and   
             Abdallah Boukeream   A survey of routing protocols based on
                                  link-stability in mobile ad hoc networks 1--10
          T. Daniel Wallace and   
        Khalim Amjad Meerja and   
                 Abdallah Shami   On-demand scheduling for concurrent
                                  multipath transfer using the stream
                                  control transmission protocol  . . . . . 11--22
              G. Campobello and   
                O. Giordano and   
                 A. Segreto and   
                     S. Serrano   Comparison of local lossless compression
                                  algorithms for Wireless Sensor Networks  23--31
              Raed Alsaqour and   
              Maha Abdelhaq and   
               Rashid Saeed and   
                Mueen Uddin and   
               Ola Alsukour and   
       Mohammed Al-Hubaishi and   
                  Tariq Alahdal   Dynamic packet beaconing for GPSR mobile
                                  ad hoc position-based routing protocol
                                  using fuzzy logic  . . . . . . . . . . . 32--46
            Muhammad Shiraz and   
              Mehdi Sookhak and   
              Abdullah Gani and   
            Syed Adeel Ali Shah   A Study on the Critical Analysis of
                                  Computational Offloading Frameworks for
                                  Mobile Cloud Computing . . . . . . . . . 47--60
           Anna Maria Vegni and   
               Enrico Natalizio   Forwarder smart selection protocol for
                                  limitation of broadcast storm problem    61--71
                  Xiaobo Ma and   
               Junjie Zhang and   
                 Zhenhua Li and   
                Jianfeng Li and   
                   Jing Tao and   
              Xiaohong Guan and   
             John C. S. Lui and   
                    Don Towsley   Accurate DNS query characteristics
                                  estimation via active probing  . . . . . 72--84
       Jaime Garcia-Reinoso and   
  Norberto Fernández and   
                 Ivan Vidal and   
     Jesús Arias Fisteus   Scalable data replication in
                                  content-centric networking based on
                                  alias names  . . . . . . . . . . . . . . 85--98
    Rafael Weingärtner and   
Gabriel Beims Bräscher and   
        Carlos Becker Westphall   Cloud resource management: a survey on
                                  forecasting and profiling models . . . . 99--106
                 Hela Mliki and   
               Lamia Chaari and   
                   Lotfi Kamoun   A comprehensive survey on Carrier
                                  Ethernet Congestion Management mechanism 107--130
    Angela Sara Cacciapuoti and   
           Marcello Caleffi and   
                Luigi Paura and   
             Md Arafatur Rahman   Channel availability for mobile
                                  cognitive radio networks . . . . . . . . 131--136
               Lutful Karim and   
                  N. Nasser and   
              Q. H. Mahmoud and   
           Alagan Anpalagan and   
                    T. E. Salti   Range-free localization approach for M2M
                                  communication system using mobile anchor
                                  nodes  . . . . . . . . . . . . . . . . . 137--146
               Subir Halder and   
                  Sipra Das Bit   Design of an Archimedes' spiral based
                                  node deployment scheme targeting
                                  enhancement of network lifetime in
                                  wireless sensor networks . . . . . . . . 147--167
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 48, Number ??, February, 2015

            Massimo Vecchio and   
  Roberto López-Valcarce   Improving area coverage of wireless
                                  sensor networks via controllable mobile
                                  nodes: a greedy approach . . . . . . . . 1--13
                 Ruiying Li and   
                Jingfu Wang and   
                Haitao Liao and   
                     Ning Huang   A new method for reliability allocation
                                  of avionics connected via an airborne
                                  network  . . . . . . . . . . . . . . . . 14--21
      Alejandro Ruiz-Rivera and   
               Kwan-Wu Chin and   
                    Sieteng Soh   A novel framework to mitigate the
                                  negative impacts of green techniques on
                                  BGP  . . . . . . . . . . . . . . . . . . 22--34
                     Wei Li and   
                      Wei Zhang   Coverage hole and boundary nodes
                                  detection in wireless sensor networks    35--43
            Adnan Akhunzada and   
              Mehdi Sookhak and   
           Nor Badrul Anuar and   
              Abdullah Gani and   
                 Ejaz Ahmed and   
            Muhammad Shiraz and   
             Steven Furnell and   
                 Amir Hayat and   
          Muhammad Khurram Khan   Man-At-The-End attacks: Analysis,
                                  taxonomy, human aspects, motivation and
                                  future directions  . . . . . . . . . . . 44--57
       Muhammad Ashad Kabir and   
                    Jun Han and   
                   Bonghee Hong   Reader level filtering for efficient
                                  query processing in RFID middleware  . . 58--70
                   Bin Liao and   
                   Jiong Yu and   
                  Tao Zhang and   
                Guo Binglei and   
                    Sun Hua and   
                 Changtian Ying   Energy-efficient algorithms for
                                  distributed storage system based on
                                  block storage structure reconfiguration  71--86
             Chien-Fu Cheng and   
                  Kuo-Tang Tsai   A recursive Byzantine-resilient protocol 87--98
                 Jieyao Liu and   
                 Ejaz Ahmed and   
            Muhammad Shiraz and   
              Abdullah Gani and   
             Rajkumar Buyya and   
                  Ahsan Qureshi   Application partitioning algorithms in
                                  mobile cloud computing: Taxonomy, review
                                  and future directions  . . . . . . . . . 99--117
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 49, Number ??, March, 2015

                Xianfu Meng and   
                 Yanli Wang and   
                       Yue Gong   Perspective of space and time based
                                  replica population organizing strategy
                                  in unstructured peer-to-peer networks    1--14
               Jia Hao Kong and   
                Li-Minn Ang and   
                 Kah Phooi Seng   A comprehensive survey of modern
                                  symmetric cryptographic solutions for
                                  resource constrained environments  . . . 15--50
                Peiyan Yuan and   
                       Ping Liu   Data fusion prolongs the lifetime of
                                  mobile sensing networks  . . . . . . . . 51--59
                Faiza Nawaz and   
                    Varun Jeoti   NFRA-C, neighbor friendly reader to
                                  reader anti-collision protocol with
                                  counters for dense reader environments   60--67
               Xiaonan Wang and   
                 Deguang Le and   
                 Yufeng Yao and   
                    Conghua Xie   Location-based mobility support for
                                  6LoWPAN wireless sensor networks . . . . 68--77
                 Ying Zhang and   
              Houkuan Huang and   
                     Hui He and   
                  Jing Teng and   
                   Zhuxiao Wang   Efficient distributed semantic based
                                  data and service unified discovery with
                                  one-dimensional semantic space . . . . . 78--87
        Amir Masoud Rahmani and   
              Zeinab Fadaie and   
        Anthony T. Chronopoulos   Data placement using Dewey Encoding in a
                                  hierarchical data grid . . . . . . . . . 88--98
              Hendrik Moens and   
                 Filip De Turck   Shared resource network-aware impact
                                  determination algorithms for service
                                  workflow deployment with partial cloud
                                  offloading . . . . . . . . . . . . . . . 99--111
         Qazi Mamoon Ashraf and   
           Mohamed Hadi Habaebi   Autonomic schemes for threat mitigation
                                  in Internet of Things  . . . . . . . . . 112--127
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 50, Number ??, April, 2015

             Babak Daghighi and   
        Miss Laiha Mat Kiah and   
   Shahaboddin Shamshirband and   
       Muhammad Habib Ur Rehman   Toward secure group communication in
                                  wireless mobile environments: Issues,
                                  solutions, and challenges  . . . . . . . 1--14
               Yasir Saleem and   
    Mubashir Husain Rehmani and   
               Sherali Zeadally   Integration of Cognitive Radio
                                  Technology with unmanned aerial
                                  vehicles: Issues, opportunities, and
                                  future research challenges . . . . . . . 15--31
                 Laisen Nie and   
               Dingde Jiang and   
                        Lei Guo   A convex optimization-based traffic
                                  matrix estimation approach in
                                  IP-over-WDM backbone networks  . . . . . 32--38
              Lingfang Zeng and   
       Bharadwaj Veeravalli and   
               Albert Y. Zomaya   An integrated task computation and data
                                  management scheduling strategy for
                                  workflow applications in cloud
                                  environments . . . . . . . . . . . . . . 39--48
Lorena González-Manzano and   
                 Agustin Orfila   An efficient confidentiality-preserving
                                  Proof of Ownership for deduplication . . 49--59
               Jonathan Loo and   
                    Mahdi Aiash   Special issue on information-centric
                                  network architecture, protocols,
                                  algorithms and applications  . . . . . . 60--63
               Jonathan Loo and   
                    Mahdi Aiash   Challenges and solutions for secure
                                  information centric networks: a case
                                  study of the NetInf architecture . . . . 64--72
                Mahdi Aiash and   
                   Jonathan Loo   An integrated authentication and
                                  authorization approach for the network
                                  of information architecture  . . . . . . 73--79
                 Mingwei Xu and   
             Zhongxing Ming and   
                Chunmei Xia and   
                     Jia Ji and   
                     Dan Li and   
                       Dan Wang   SIONA: a Service and Information
                                  Oriented Network Architecture  . . . . . 80--91
            Charilaos Stais and   
           George Xylomenos and   
            Alexios Voulimeneas   A reliable multicast transport protocol
                                  for information-centric networks . . . . 92--100
                  Dabin Kim and   
               Sung-Won Lee and   
               Young-Bae Ko and   
                   Jae-Hoon Kim   Cache capacity-aware content centric
                                  networking under flash crowds  . . . . . 101--113
                   Paulo Mendes   Combining data naming and context
                                  awareness for pervasive networks . . . . 114--125
        Bander A. Alzahrani and   
             Martin J. Reed and   
      Janne Riihijärvi and   
        Vassilios G. Vassilakis   Scalability of information centric
                                  networking using mediated topology
                                  management . . . . . . . . . . . . . . . 126--133
               Xiuquan Qiao and   
                Guoshun Nan and   
                   Yue Peng and   
                    Lei Guo and   
               Jingwen Chen and   
                 Yunlei Sun and   
                  Junliang Chen   NDNBrowser: an extended web browser for
                                  named data networking  . . . . . . . . . 134--147
              Marica Amadeo and   
            Claudia Campolo and   
             Antonella Molinaro   Forwarding strategies in named data
                                  wireless ad hoc networks: Design and
                                  evaluation . . . . . . . . . . . . . . . 148--158
                     S. Eum and   
                   Y. Shoji and   
                  M. Murata and   
                   N. Nishinaga   Design and implementation of ICN-enabled
                                  IEEE 802.11 access points as nano data
                                  centers  . . . . . . . . . . . . . . . . 159--167
              Lingwei Zhang and   
                 Yuhui Deng and   
                Weiheng Zhu and   
                Jipeng Zhou and   
                     Frank Wang   Skewly replicating hot data to construct
                                  a power-efficient storage cluster  . . . 168--179
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 51, Number ??, May, 2015

 Jack Fernando Bravo-Torres and   
Martín López-Nores and   
Yolanda Blanco-Fernández and   
José Juan Pazos-Arias and   
        Manuel Ramos-Cabrer and   
              Alberto Gil-Solla   An improved virtualization layer to
                                  support distribution of multimedia
                                  contents in pervasive social
                                  applications . . . . . . . . . . . . . . 1--17
Víctor Berrocal-Plaza and   
Miguel A. Vega-Rodríguez and   
Juan M. Sánchez-Pérez   Optimizing the mobility management task
                                  in networks of four world capital cities 18--28
           M. Sajid Mushtaq and   
               Scott Fowler and   
         Abdelhamid Mellouk and   
                 Brice Augustin   QoE/QoS-aware LTE downlink scheduler for
                                  VoIP with power saving . . . . . . . . . 29--46
                  Kun Huang and   
                Gaogang Xie and   
                 Yanbiao Li and   
                   Dafang Zhang   Memory-efficient IP lookup using trie
                                  merging for scalable virtual routers . . 47--58
                     Yu Liu and   
                    Bin Guo and   
                   Chi Zhou and   
                       Yu Cheng   Network-coded cooperative information
                                  recovery in cellular/802.11 mobile
                                  Networks . . . . . . . . . . . . . . . . 59--67
                Linfeng Liu and   
             Ningshen Zhang and   
                         Ye Liu   Topology control models and solutions
                                  for signal irregularity in mobile
                                  underwater wireless sensor networks  . . 68--90
          Rajesh Anbazhagan and   
           Nakkeeran Rangaswamy   Investigations on enhanced power saving
                                  mechanism for IEEE 802.16m network with
                                  heterogeneous traffic  . . . . . . . . . 91--101
            Behnam Dezfouli and   
                Marjan Radi and   
           Shukor Abd Razak and   
              Tan Hwee-Pink and   
        Kamalrulnizam Abu Bakar   Modeling low-power wireless
                                  communications . . . . . . . . . . . . . 102--126
           Mohammed Atiquzzaman   Editorial  . . . . . . . . . . . . . . . 127--129
          Cüneyt Sevgi and   
          Altan Koçyigit   Corrigendum to ``Optimal deployment in
                                  randomly deployed heterogeneous WSNs: a
                                  connected coverage approach'' [J. Netw.
                                  Comput. Appl. \bf 46, (2014), 182--197]  130
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 52, Number ??, June, 2015

    Athanasios V. Vasilakos and   
                     Zhe Li and   
              Gwendal Simon and   
                        Wei You   Information centric network: Research
                                  challenges and opportunities . . . . . . 1--10
           Raja Wasim Ahmad and   
              Abdullah Gani and   
     Siti Hafizah Ab. Hamid and   
            Muhammad Shiraz and   
         Abdullah Yousafzai and   
                       Feng Xia   A survey on virtual machine migration
                                  and server consolidation frameworks for
                                  cloud data centers . . . . . . . . . . . 11--25
               Ying-Dar Lin and   
             Minh-Tuan Thai and   
           Chih-Chiang Wang and   
                 Yuan-Cheng Lai   Two-tier project and job scheduling for
                                  SaaS cloud service providers . . . . . . 26--36
      Elizabeth A. Thompson and   
           Charles McIntosh and   
               James Isaacs and   
              Eric Harmison and   
                    Ross Sneary   Robot communication link using 802.11n
                                  or 900 MHz OFDM  . . . . . . . . . . . . 37--51
                 Ejaz Ahmed and   
              Abdullah Gani and   
              Mehdi Sookhak and   
      Siti Hafizah Ab Hamid and   
                       Feng Xia   Application optimization in mobile cloud
                                  computing: Motivation, taxonomies, and
                                  open challenges  . . . . . . . . . . . . 52--68
                Guodong Sun and   
                   Lin Zhao and   
                 Zhibo Chen and   
                     Guofu Qiao   Effective link interference model in
                                  topology control of wireless ad hoc and
                                  sensor networks  . . . . . . . . . . . . 69--78
                     Hao Ji and   
                    Lei Xie and   
                 Chuyu Wang and   
                 Yafeng Yin and   
                      Sanglu Lu   CrowdSensing: a crowd-sourcing based
                                  indoor navigation using RFID-based delay
                                  tolerant network . . . . . . . . . . . . 79--89
                   Ming Tao and   
             Shuqiang Huang and   
                    Yang Li and   
                    Min Yan and   
                      Yuyu Zhou   SA-PSO based optimizing reader
                                  deployment in large-scale RFID Systems   90--100
                   Ali Ghaffari   Congestion control mechanisms in
                                  wireless sensor networks: a survey . . . 101--115
       Riham S. Y. Elhabyan and   
          Mustapha C. E. Yagoub   Two-tier particle swarm optimization
                                  protocol for clustering and routing in
                                  wireless sensor network  . . . . . . . . 116--128
                Tien Van Do and   
                  Nam H. Do and   
Ádám Horváth and   
                   Jinting Wang   Modelling opportunistic spectrum renting
                                  in mobile cellular networks  . . . . . . 129--138
                  Wei Jiang and   
                     Yue Ma and   
                  Xia Zhang and   
                Xupeng Wang and   
                      Zili Shao   Adaptive security management of
                                  real-time storage applications over NAND
                                  based storage systems  . . . . . . . . . 139--153
                 Ejaz Ahmed and   
              Abdullah Gani and   
      Muhammad Khurram Khan and   
             Rajkumar Buyya and   
                  Samee U. Khan   Seamless application execution in mobile
                                  cloud computing: Motivation, taxonomy,
                                  and open challenges  . . . . . . . . . . 154--172
             Athar Ali Khan and   
    Mubashir Husain Rehmani and   
                   Yasir Saleem   Neighbor discovery in traditional
                                  wireless networks and cognitive radio
                                  networks: Basics, taxonomy, challenges
                                  and future research directions . . . . . 173--190
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 53, Number ??, July, 2015

          Amin Ebrahimzadeh and   
   Akbar Ghaffarpour Rahbar and   
               Behrooz Alizadeh   QoS aware green routing and wavelength
                                  assignment in core WDM networks  . . . . 1--13
               Engin Arslan and   
               Murat Yuksel and   
              Mehmet Hadi Gunes   Training network administrators in a
                                  game-like environment  . . . . . . . . . 14--23
   Sérgio Figueiredo and   
                  Seil Jeon and   
                Diogo Gomes and   
                  Rui L. Aguiar   D3M: Multicast listener mobility support
                                  mechanisms over distributed mobility
                                  anchoring architectures  . . . . . . . . 24--38
              Sudeep Tanwar and   
               Neeraj Kumar and   
        Joel J. P. C. Rodrigues   A systematic review on heterogeneous
                                  routing protocols for wireless sensor
                                  network  . . . . . . . . . . . . . . . . 39--56
                  Yong Wang and   
                    Yun Xia and   
                    Jie Hou and   
               Shi-meng Gao and   
                   Xiao Nie and   
                        Qi Wang   A fast privacy-preserving framework for
                                  continuous location-based queries in
                                  road networks  . . . . . . . . . . . . . 57--73
               S. Arunkumar and   
                M. Srivatsa and   
                   M. Rajarajan   A review paper on preserving privacy in
                                  mobile environments  . . . . . . . . . . 74--90
          Abdelali Boushaba and   
              Adil Benabbou and   
            Rachid Benabbou and   
              Azeddine Zahi and   
                Mohammed Oumsis   Multi-point relay selection strategies
                                  to reduce topology control traffic for
                                  OLSR protocol in MANETs  . . . . . . . . 91--102
              Jingyuan Wang and   
               Jiangtao Wen and   
                    Chao Li and   
                Zhang Xiong and   
                     Yuxing Han   DC-Vegas: a delay-based TCP congestion
                                  control algorithm for datacenter
                                  applications . . . . . . . . . . . . . . 103--114
           Valentina Caputi and   
                Antonio Garrido   Student-oriented planning of e-learning
                                  contents for Moodle  . . . . . . . . . . 115--127
             Chao-Liang Liu and   
            Cheng-Jung Tsai and   
              Ting-Yi Chang and   
              Wang-Jui Tsai and   
                   Po-Kai Zhong   Implementing multiple biometric features
                                  for a recall-based graphical keystroke
                                  dynamics authentication system on a
                                  smart phone  . . . . . . . . . . . . . . 128--139
             Zhongbao Zhang and   
                     Sen Su and   
                  Yikai Lin and   
                Xiang Cheng and   
                 Kai Shuang and   
                        Peng Xu   Adaptive multi-objective artificial
                                  immune system based virtual network
                                  embedding  . . . . . . . . . . . . . . . 140--155
                Zhiting Lin and   
                     XiuLong Wu   Analyzing and modeling mobility for
                                  infrastructure-less communication  . . . 156--163
       Sara Modarres Razavi and   
                    Di Yuan and   
         Fredrik Gunnarsson and   
                      Johan Moe   On dynamic signaling congestion
                                  mitigation by overlapping tracking area
                                  lists  . . . . . . . . . . . . . . . . . 164--172
                Xiumin Wang and   
                  Chau Yuen and   
              Xiaoming Chen and   
           Naveed Ul Hassan and   
                  Yiming Ouyang   Cost-aware demand scheduling for delay
                                  tolerant applications  . . . . . . . . . 173--182
                 Mario Collotta   FLBA: a fuzzy algorithm for load
                                  balancing in IEEE 802.11 networks  . . . 183--192
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 54, Number ??, August, 2015

           Imad Abdeljaouad and   
                 Ahmed Karmouch   Monitoring IPTV quality of experience in
                                  overlay networks using utility functions 1--10
                  Yujie Liu and   
                    Yong Li and   
                   Yue Wang and   
                      Jian Yuan   Optimal scheduling for multi-flow update
                                  in Software-Defined Networks . . . . . . 11--19
        Saman Homayounnejad and   
                Alireza Bagheri   An efficient distributed max-flow
                                  algorithm for Wireless Sensor Networks   20--32
              Tarek AlSkaif and   
      Manel Guerrero Zapata and   
                 Boris Bellalta   Game theory for energy efficiency in
                                  Wireless Sensor Networks: Latest trends  33--61
Leovigildo Sánchez-Casado and   
Gabriel Maciá-Fernández and   
Pedro García-Teodoro and   
               Nils Aschenbruck   Identification of contamination zones
                                  for sinkhole detection in MANETs . . . . 62--77
              Maleeha Najam and   
               Usman Younis and   
               Raihan ur Rasool   Speculative parallel pattern matching
                                  using stride-$k$ DFA for deep packet
                                  inspection . . . . . . . . . . . . . . . 78--87
            Normalia Samian and   
    Zuriati Ahmad Zukarnain and   
         Winston K. G. Seah and   
            Azizol Abdullah and   
             Zurina Mohd Hanapi   Cooperation stimulation mechanisms for
                                  wireless multihop networks: a survey . . 88--106
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 55, Number ??, September, 2015

             Apostolos Malatras   State-of-the-art survey on P2P overlay
                                  networks in pervasive computing
                                  environments . . . . . . . . . . . . . . 1--23
                 Aqsa Malik and   
               Junaid Qadir and   
             Basharat Ahmad and   
          Kok-Lim Alvin Yau and   
                    Ubaid Ullah   QoS in IEEE 802.11-based wireless
                                  networks: a contemporary review  . . . . 24--46
                Yaguang Lin and   
              Xiaoming Wang and   
               Lichen Zhang and   
                    Peng Li and   
                  Dan Zhang and   
                        Sen Liu   The impact of node velocity diversity on
                                  mobile opportunistic network performance 47--58
               Yingjie Wang and   
               Guisheng Yin and   
                Zhipeng Cai and   
                 Yuxin Dong and   
                   Hongbin Dong   A trust-based probabilistic
                                  recommendation model for social networks 59--67
    Diego F. Ramírez and   
         Sandra Céspedes   Routing in Neighborhood Area Networks: a
                                  survey in the context of AMI
                                  communications . . . . . . . . . . . . . 68--80
                    S. Liao and   
                     J. Sun and   
                    Y. Chen and   
                    Y. Wang and   
                       P. Zhang   Distributed power control for wireless
                                  networks via the alternating direction
                                  method of multipliers  . . . . . . . . . 81--88
      Alireza Shameli-Sendi and   
                Michel Dagenais   ORCEF: Online response cost evaluation
                                  framework for intrusion response system  89--107
              Zia-ur Rehman and   
       Omar Khadeer Hussain and   
        Farookh Khadeer Hussain   User-side cloud service management:
                                  State-of-the-art and future directions   108--122
             Shazana Md Zin and   
           Nor Badrul Anuar and   
        Miss Laiha Mat Kiah and   
                  Ismail Ahmedy   Survey of secure multipath routing
                                  protocols for WSNs . . . . . . . . . . . 123--153
                   Kai Wang and   
                         Jun Li   FREME: a pattern partition based engine
                                  for fast and scalable regular expression
                                  matching in practice . . . . . . . . . . 154--169
                Dingqi Yang and   
               Daqing Zhang and   
              Longbiao Chen and   
                    Bingqing Qu   NationTelescope: Monitoring and
                                  visualizing large-scale collective
                                  behavior in LBSNs  . . . . . . . . . . . 170--180
         Mohamed A. Alrshah and   
             Mohamed Othman and   
            Borhanuddin Ali and   
             Zurina Mohd Hanapi   Agile-SD: a Linux-based TCP congestion
                                  control algorithm for supporting
                                  high-speed and short-distance networks   181--190
             Katja Cetinski and   
                Matjaz B. Juric   AME-WPC: Advanced model for efficient
                                  workload prediction in the cloud . . . . 191--201
                Sudip Misra and   
              Samaresh Bera and   
              Tamoghna Ojha and   
                     Liang Zhou   ENTICE: Agent-based energy trading with
                                  incomplete information in the smart grid 202--212
          Vlasios Kasapakis and   
               Damianos Gavalas   Pervasive gaming: Status, trends and
                                  design principles  . . . . . . . . . . . 213--236
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 56, Number ??, October, 2015

                    Amin Karami   ACCPndn: Adaptive Congestion Control
                                  Protocol in Named Data Networking by
                                  learning capacities using optimized
                                  Time-Lagged Feedforward Neural Network   1--18
              Zhaolong Ning and   
              Qingyang Song and   
                    Lei Guo and   
                  Xiangjie Kong   A novel adaptive spectrum allocation
                                  scheme for multi-channel multi-radio
                                  wireless mesh networks . . . . . . . . . 19--27
              Minhaj Ahmad Khan   A survey of computation offloading
                                  strategies for performance improvement
                                  of applications running on mobile
                                  devices  . . . . . . . . . . . . . . . . 28--40
           Sergio Ricciardi and   
         Francesco Palmieri and   
        Aniello Castiglione and   
                Davide Careglio   Energy efficiency of elastic frequency
                                  grids in multilayer
                                  IP/MPLS-over-flexgrid networks . . . . . 41--47
          Ibrahim Abdullahi and   
                  Suki Arif and   
                 Suhaidi Hassan   Survey on caching approaches in
                                  Information Centric Networking . . . . . 48--59
                T. Hamrouni and   
                 C. Hamdeni and   
                F. Ben Charrada   Impact of the distribution quality of
                                  file replicas on replication strategies  60--76
              M. S. S. Khan and   
                 Anup Kumar and   
                    Bin Xie and   
              Prasanna K. Sahoo   Network tomography application in mobile
                                  ad-hoc network using stitching algorithm 77--87
     Giannis Haralabopoulos and   
    Ioannis Anagnostopoulos and   
               Sherali Zeadally   Lifespan and propagation of information
                                  in On-line Social Networks: a case study
                                  based on Reddit  . . . . . . . . . . . . 88--100
                   Esa Kerttula   A novel federated strong mobile
                                  signature service --- the Finnish case   101--114
     Maria Carla Calzarossa and   
                Daniele Tessera   Modeling and predicting temporal
                                  patterns of web content changes  . . . . 115--123
          Michael Till Beck and   
            Andreas Fischer and   
         Juan Felipe Botero and   
    Claudia Linnhoff-Popien and   
                Hermann de Meer   Distributed and scalable embedding of
                                  virtual networks . . . . . . . . . . . . 124--136
   Mohd Izuan Hafez Ninggal and   
               Jemal H. Abawajy   Utility-aware social network graph
                                  anonymization  . . . . . . . . . . . . . 137--148
            Sheng-Shih Wang and   
               Chun-Chih Li and   
              Hsieh-Wei Lin and   
                 Kuei-Ping Shih   A passive self-configuration MAC
                                  protocol for supporting network
                                  management in IEEE 802.11-based
                                  multi-hop mobile ad hoc networks . . . . 149--157
                   Chi Chen and   
                Xiaojie Zhu and   
               Peisong Shen and   
                    Jing Yu and   
                   Hong Zou and   
                     Jiankun Hu   SOLS: a scheme for outsourced location
                                  based service  . . . . . . . . . . . . . 158--165
         Keyvan RahimiZadeh and   
            Morteza AnaLoui and   
              Peyman Kabiri and   
                  Bahman Javadi   Performance modeling and analysis of
                                  virtualized multi-tier applications
                                  under dynamic workloads  . . . . . . . . 166--187
 Veerabhadra R. Chandakanna and   
             Valli K. Vatsavayi   A sliding window based Self-Learning and
                                  Adaptive Load Balancer . . . . . . . . . 188--205
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 57, Number ??, November, 2015

               Abbas Bradai and   
      Abderrahim Benslimane and   
                 Kamal D. Singh   Dynamic anchor points selection for
                                  mobility management in Software Defined
                                  Networks . . . . . . . . . . . . . . . . 1--11
                 Erdun Zhao and   
                  Liansheng Tan   A PCA based optimization approach for IP
                                  traffic matrix estimation  . . . . . . . 12--20
              Younghoon Kim and   
                 Ikjun Yeom and   
                     Jun Bi and   
                     Yusung Kim   Scalable and efficient file sharing in
                                  information-centric networking . . . . . 21--32
           Gürkan Gür   Energy-aware cache management at the
                                  wireless network edge for
                                  information-centric operation  . . . . . 33--42
                     Qin Xu and   
                     Fan Li and   
               Jinsheng Sun and   
                 Moshe Zukerman   A new TCP/AQM system analysis  . . . . . 43--60
              Shin-Jer Yang and   
                     Yi-Ru Chen   Design adaptive task allocation
                                  scheduler to improve MapReduce
                                  performance in heterogeneous clouds  . . 61--70
             Rup Kumar Deka and   
     Kausthav Pratim Kalita and   
         D. K. Bhattacharya and   
                Jugal K. Kalita   Network defense: Approach's, methods and
                                  techniques . . . . . . . . . . . . . . . 71--84
      Suchetana Chakraborty and   
         Sandip Chakraborty and   
              Sukumar Nandi and   
              Sushanta Karmakar   Fault resilience in sensor networks:
                                  Distributed node-disjoint multi-path
                                  multi-sink forwarding  . . . . . . . . . 85--101
           Maristella Ribas and   
              C. G. Furtado and   
José Neuman de Souza and   
  Giovanni Cordeiro Barroso and   
         Antão Moura and   
            Alberto S. Lima and   
      Flávio R. C. Sousa   A Petri net-based decision-making
                                  framework for assessing cloud services
                                  adoption: the use of spot instances for
                                  cost reduction . . . . . . . . . . . . . 102--118
                     Wei Li and   
             Jorge Portilla and   
        Félix Moreno and   
              Guixuan Liang and   
                  Teresa Riesgo   Multiple feature points representation
                                  in target localization of wireless
                                  visual sensor networks . . . . . . . . . 119--128
               Jiaoyan Chen and   
                  Bang Wang and   
                      Wenyu Liu   Constructing perimeter barrier coverage
                                  with bistatic radar sensors  . . . . . . 129--141
  Amir Hossein Mohajerzadeh and   
  Mohammad Hossein Yaghmaee and   
              Afsane Zahmatkesh   Efficient data collecting and target
                                  parameter estimation in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 142--155
                  Yuhwa Suh and   
                Kiyoung Kim and   
                   Aran Kim and   
                   Yongtae Shin   A study on impact of wired access
                                  networks for green Internet  . . . . . . 156--168
          Mohammad Khanjary and   
              Masoud Sabaei and   
          Mohammad Reza Meybodi   Critical density for coverage and
                                  connectivity in two-dimensional
                                  fixed-orientation directional sensor
                                  networks using continuum percolation . . 169--181
               Dingde Jiang and   
              Zhengzheng Xu and   
                Wenqin Wang and   
              Yuanting Wang and   
                       Yang Han   A collaborative multi-hop routing
                                  algorithm for maximum achievable rate    182--191
           Haythem Bany Salameh   Spread spectrum-based coordination
                                  design for spectrum-agile wireless ad
                                  hoc networks . . . . . . . . . . . . . . 192--201
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 58, Number ??, December, 2015

                    Zhe Guo and   
                      Zheng Yan   A Weighted Semi-Distributed Routing
                                  Algorithm for LEO satellite networks . . 1--11
          Francesco Carrabs and   
           Raffaele Cerulli and   
         Ciriaco D'Ambrosio and   
                 Andrea Raiconi   A hybrid exact approach for maximizing
                                  lifetime in sensor networks with
                                  complete and partial coverage
                                  constraints  . . . . . . . . . . . . . . 12--22
    Osama M. Hussain Rehman and   
            Hadj Bourdoucen and   
            Mohamed Ould-Khaoua   Forward link quality estimation in
                                  VANETs for sender-oriented alert
                                  messages broadcast . . . . . . . . . . . 23--41
           Raja Wasim Ahmad and   
              Abdullah Gani and   
     Siti Hafizah Ab. Hamid and   
                   Feng Xia and   
                Muhammad Shiraz   A Review on mobile application energy
                                  profiling: Taxonomy, state-of-the-art,
                                  and open research issues . . . . . . . . 42--59
            B. Coll-Perales and   
                J. Gozalvez and   
                    M. Sepulcre   Empirical models of the communications
                                  performance of Multi-hop Cellular
                                  Networks using D2D . . . . . . . . . . . 60--72
             Bassam J. Mohd and   
            Thaier Hayajneh and   
        Athanasios V. Vasilakos   A survey on lightweight block ciphers
                                  for low-resource devices: Comparative
                                  study and open issues  . . . . . . . . . 73--93
                Jianwei Niu and   
               Danning Wang and   
           Mohammed Atiquzzaman   Copy limited flooding over opportunistic
                                  networks . . . . . . . . . . . . . . . . 94--107
         Fatima Lamia Haddi and   
           Mahfoud Bencha\"\iba   A survey of incentive mechanisms in
                                  static and mobile P2P systems  . . . . . 108--118
            Ihab Ahmed Najm and   
             Mahamod Ismail and   
               Jaime Lloret and   
        Kayhan Zrar Ghafoor and   
               B. B. Zaidan and   
       Abd Al-razak Tareq Rahem   Improvement of SCTP congestion control
                                  in the LTE-A network . . . . . . . . . . 119--129
               Amjad Hajjar and   
              Jawad Khalife and   
Jesús Díaz-Verdejo   Network traffic application
                                  identification based on message size
                                  analysis . . . . . . . . . . . . . . . . 130--143
         Sheharbano Khattak and   
               Zaafar Ahmed and   
              Affan A. Syed and   
                Syed Ali Khayam   BotFlex: a community-driven tool for
                                  botnet detection . . . . . . . . . . . . 144--154
               Guijuan Wang and   
                   Jiguo Yu and   
                Dongxiao Yu and   
                  Haitao Yu and   
                    Li Feng and   
                        Pan liu   DS--MAC: an energy efficient demand
                                  sleep MAC protocol with low latency for
                                  wireless sensor networks . . . . . . . . 155--164
      Alireza Shameli-Sendi and   
            Makan Pourzandi and   
        Mohamed Fekih-Ahmed and   
                Mohamed Cheriet   Taxonomy of Distributed Denial of
                                  Service mitigation approaches for cloud
                                  computing  . . . . . . . . . . . . . . . 165--179
               Fang-Yie Leu and   
                Chin-Yu Liu and   
              Jung-Chun Liu and   
            Fuu-Cheng Jiang and   
                   Heru Susanto   S-PMIPv6: an intra-LMA model for IPv6
                                  mobility . . . . . . . . . . . . . . . . 180--191
               Jaime Lloret and   
        Kayhan Zrar Ghafoor and   
             Danda B. Rawat and   
                 Youssef Nasser   Green network protocols and algorithms   192--193
                 Ruiqi Ding and   
      Cristina Hava Muntean and   
           Gabriel-Miro Muntean   Energy-efficient device-differentiated
                                  cooperative adaptive multimedia delivery
                                  solution in wireless networks  . . . . . 194--207
                  Zuhal Can and   
                 Murat Demirbas   Smartphone-based data collection from
                                  wireless sensor networks in an urban
                                  environment  . . . . . . . . . . . . . . 208--216
Miguel Rodríguez-Pérez and   
Sergio Herrería-Alonso and   
Manuel Fernández-Veiga and   
Cándido López-García   An ant colonization routing algorithm to
                                  minimize network power consumption . . . 217--226
               Mahmoud Sami and   
       Nor Kamariah Noordin and   
       Fazirulhysiam Hashim and   
        Shamala Subramaniam and   
     Ayyoub Akbari-Moghanjoughi   An Energy-Aware Cross-Layer Cooperative
                                  MAC Protocol for Wireless Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 227--240
               Chengming Li and   
                Wenjing Liu and   
                   Lei Wang and   
                 Mingchu Li and   
                   Koji Okamura   Energy-efficient quality of service
                                  aware forwarding scheme for
                                  Content-Centric Networking . . . . . . . 241--254
       Seyed Iman PourEmami and   
                Bahador Bakhshi   On the trade-off between
                                  power-efficiency and blocking
                                  probability in fault-tolerant WDM
                                  networks . . . . . . . . . . . . . . . . 255--266
            Anas Daghistani and   
    Abderrahman Ben Khalifa and   
              Ahmad Showail and   
                  Basem Shihada   Green partial packet recovery in
                                  wireless sensor networks . . . . . . . . 267--279
               Chih-Heng Ke and   
              Chong-Yi Yang and   
           Jiann-Liang Chen and   
        Kayhan Zrar Ghafoor and   
                   Jaime Lloret   Frame-based mapping mechanism for
                                  energy-efficient MPEG-4 video
                                  transmission over IEEE 802.11e networks
                                  with better quality of delivery  . . . . 280--286
                M. Bakhouya and   
                   J. Gaber and   
                      P. Lorenz   Energy evaluation of AID protocol in
                                  Mobile Ad Hoc Networks . . . . . . . . . 287--293
   Mohammad Reza Jabbarpour and   
            Rafidah Md Noor and   
          Rashid Hafeez Khokhar   Green vehicle traffic routing system
                                  using ant-based algorithm  . . . . . . . 294--308
            Muhammad Faheem and   
       Muhammad Zahid Abbas and   
                Gurkan Tuna and   
             Vehbi Cagri Gungor   EDHRP: Energy efficient event driven
                                  hybrid routing protocol for densely
                                  deployed wireless sensor networks  . . . 309--326
               Gangyong Jia and   
               Guangjie Han and   
              Jinfang Jiang and   
        Joel J. P. C. Rodrigues   PARS: a scheduling of periodically
                                  active rank to optimize power efficiency
                                  for main memory  . . . . . . . . . . . . 327--336
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 59, Number ??, January, 2016

            Zhang Bing Zhou and   
               Wendong Xiao and   
               Jucheng Yang and   
                    Faming Gong   Special issue on green networking,
                                  computing, and software systems  . . . . 1--3
              Jinfang Jiang and   
               Guangjie Han and   
                    Hui Guo and   
                    Lei Shu and   
        Joel J. P. C. Rodrigues   Geographic multipath routing based on
                                  geospatial division in duty-cycled
                                  underwater wireless sensor networks  . . 4--13
                  Qing Zhao and   
             Congcong Xiong and   
                      Ce Yu and   
             Chuanlei Zhang and   
                        Xi Zhao   A new energy-aware task scheduling
                                  method for data-intensive applications
                                  in the cloud . . . . . . . . . . . . . . 14--27
                   Xiao Xue and   
               Shufang Wang and   
                      Baoyun Lu   Manufacturing service composition method
                                  based on networked collaboration mode    28--38
                Yanwen Wang and   
                Hainan Chen and   
                Xiaoling Wu and   
                        Lei Shu   An energy-efficient SDN based sleep
                                  scheduling algorithm for WSNs  . . . . . 39--45
                   Keke Gai and   
                Meikang Qiu and   
                   Hui Zhao and   
                  Lixin Tao and   
                   Ziliang Zong   Dynamic energy-aware cloudlet-based
                                  mobile cloud computing model for green
                                  computing  . . . . . . . . . . . . . . . 46--54
                  Chao Tong and   
                    Yu Lian and   
                Jianwei Niu and   
                Zhongyu Xie and   
                     Yang Zhang   A novel green algorithm for sampling
                                  complex networks . . . . . . . . . . . . 55--62
              Yonghua Xiong and   
                Shaoyun Wan and   
                 Jinhua She and   
                     Min Wu and   
                    Yong He and   
                   Keyuan Jiang   An energy-optimization-based method of
                                  task scheduling for a cloud video
                                  surveillance center  . . . . . . . . . . 63--73
            Ana C. Riekstin and   
Guilherme C. Januário and   
         Bruno B. Rodrigues and   
      Viviane T. Nascimento and   
   Tereza C. M. B. Carvalho and   
                Catalin Meirosu   Orchestration of energy efficiency
                                  capabilities in networks . . . . . . . . 74--87
               Weidong Fang and   
             Chuanlei Zhang and   
                Zhidong Shi and   
                  Qing Zhao and   
                   Lianhai Shan   BTRES: Beta-based Trust and Reputation
                                  Evaluation System for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 88--94
       Martina Marjanovi\'c and   
           Lea Skorin-Kapov and   
        Kresimir Pripuzi\'c and   
       Aleksandar Antoni\'c and   
             Ivana Podnar Zarko   Energy-aware and quality-driven sensor
                                  management for green mobile crowd
                                  sensing  . . . . . . . . . . . . . . . . 95--108
                  Teng Long and   
                   Wenhui Zhang   Termination analysis with recursive
                                  calling graphs . . . . . . . . . . . . . 109--116
                  Chen Xiao and   
                Lifeng Wang and   
               Mengjiao Zhu and   
                   Wendong Wang   A resource-efficient multimedia
                                  encryption scheme for embedded video
                                  sensing system based on unmanned
                                  aircraft . . . . . . . . . . . . . . . . 117--125
               Liping Zhang and   
                Shanyu Tang and   
                    Shaohui Zhu   An energy efficient authenticated key
                                  agreement protocol for SIP-based green
                                  VoIP networks  . . . . . . . . . . . . . 126--133
               Piotr Cholda and   
                  Piotr Jaglarz   Optimization/simulation-based risk
                                  mitigation in resilient green
                                  communication networks . . . . . . . . . 134--157
                  Mingfu Li and   
                Jingping Bi and   
                  Zhongcheng Li   Improving consolidation of virtual
                                  machine based on virtual switching
                                  overhead estimation  . . . . . . . . . . 158--167
           Karn Yongsiriwit and   
                  Nour Assy and   
                  Walid Gaaloul   A semantic framework for configurable
                                  business process as a service in the
                                  cloud  . . . . . . . . . . . . . . . . . 168--184
               Debdeep Paul and   
               Wen-De Zhong and   
                 Sanjay K. Bose   Energy efficiency aware load
                                  distribution and electricity cost
                                  volatility control for cloud service
                                  providers  . . . . . . . . . . . . . . . 185--197
                  Zheli Liu and   
              Xiaofeng Chen and   
                   Jun Yang and   
                 Chunfu Jia and   
                      Ilsun You   New order preserving encryption model
                                  for outsourced databases in cloud
                                  environments . . . . . . . . . . . . . . 198--207
            Antonio Celesti and   
                Maria Fazio and   
            Massimo Villari and   
              Antonio Puliafito   Adding long-term availability,
                                  obfuscation, and encryption to
                                  multi-cloud storage systems  . . . . . . 208--218
               Yunchuan Sun and   
                   Cheng Lu and   
               Rongfang Bie and   
                 Junsheng Zhang   Semantic relation computing theory and
                                  its application  . . . . . . . . . . . . 219--229
              Miguel Castro and   
            Antonio J. Jara and   
            Antonio F. Skarmeta   Enabling end-to-end CoAP-based
                                  communications for the Web of Things . . 230--236
Juan López-de-Armentia and   
      Diego Casado-Mansilla and   
Diego López-de-Ipiña   Making social networks a means to save
                                  energy . . . . . . . . . . . . . . . . . 237--246
                    Ming Yu and   
                  Nirwan Ansari   Smart grid communications: Modeling and
                                  validation . . . . . . . . . . . . . . . 247--249
             D. A. Sbordone and   
               L. Martirano and   
                M. C. Falvo and   
              L. Chiavaroli and   
               B. Di Pietra and   
                 I. Bertini and   
                    A. Genovese   Reactive power control for an energy
                                  storage system: a real implementation in
                                  a Micro-Grid . . . . . . . . . . . . . . 250--263
                 Ziyuan Cai and   
                    Ming Yu and   
            Michael Steurer and   
                     Hui Li and   
                    Yizhou Dong   A network model for the real-time
                                  communications of a smart grid prototype 264--273
             Dhananjay Bhor and   
 Kavinkadhirselvan Angappan and   
          Krishna M. Sivalingam   Network and power-grid co-simulation
                                  framework for Smart Grid wide-area
                                  monitoring networks  . . . . . . . . . . 274--284
       Martin Wolkerstorfer and   
      Bernhard Schweighofer and   
           Hannes Wegleiter and   
            Driton Statovci and   
          Herbert Schwaiger and   
                 Walter Lackner   Measurement and simulation framework for
                                  throughput evaluation of narrowband
                                  power line communication links in
                                  low-voltage grids  . . . . . . . . . . . 285--300
           Cristina Alcaraz and   
               Javier Lopez and   
              Stephen Wolthusen   Policy enforcement system for secure
                                  interoperable control in distributed
                                  Smart Grid systems . . . . . . . . . . . 301--314
                 Yuan Zhang and   
          Navid Rahbari-Asr and   
                   Mo-Yuen Chow   A robust distributed system incremental
                                  cost estimation algorithm for smart grid
                                  economic dispatch with communications
                                  information losses . . . . . . . . . . . 315--324
                    Ping Yi and   
                   Ting Zhu and   
             Qingquan Zhang and   
                     Yue Wu and   
                         Li Pan   Puppet attack: a denial of service
                                  attack in advanced metering
                                  infrastructure network . . . . . . . . . 325--332
                 Mungyu Bae and   
                 Kangho Kim and   
                   Hwangnam Kim   Preserving privacy and efficiency in
                                  data communication and aggregation for
                                  AMI network  . . . . . . . . . . . . . . 333--344
              Raphael Amoah and   
              Seyit Camtepe and   
                     Ernest Foo   Formal modelling and analysis of DNP3
                                  secure authentication  . . . . . . . . . 345--360
           Jemal H. Abawajy and   
           Albert Y. Zomaya and   
               Ivan Stojmenovic   Network computing and applications for
                                  Big Data analytics . . . . . . . . . . . 361
                     Wei Xu and   
               Jianshan Sun and   
                    Jian Ma and   
                         Wei Du   A personalized information
                                  recommendation system for R&D project
                                  opportunity finding in big data contexts 362--369
               Amineh Amini and   
               Hadi Saboohi and   
              Tutut Herawan and   
                   Teh Ying Wah   MuDi-Stream: a multi density clustering
                                  algorithm for evolving data stream . . . 370--385
       R. S. Villaça and   
                R. Pasquini and   
             L. B. de Paula and   
         M. F. Magalhães   HCube: Routing and similarity search in
                                  Data Centers . . . . . . . . . . . . . . 386--398
            Khaleel Mershad and   
              Hassan Artail and   
               Mazen Saghir and   
                 Hazem Hajj and   
                  Mariette Awad   A mathematical model to analyze the
                                  utilization of a cloud datacenter
                                  middleware . . . . . . . . . . . . . . . 399--415
       Maumita Bhattacharya and   
              Rafiqul Islam and   
                  Jemal Abawajy   Evolutionary optimization: a big data
                                  perspective  . . . . . . . . . . . . . . 416--426
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 60, Number ??, January, 2016

          Barbara Carminati and   
              Elena Ferrari and   
                 Ngoc Hong Tran   Trustworthy and effective
                                  person-to-person payments over multi-hop
                                  MANETs . . . . . . . . . . . . . . . . . 1--18
            Mohiuddin Ahmed and   
        Abdun Naser Mahmood and   
                     Jiankun Hu   A survey of network anomaly detection
                                  techniques . . . . . . . . . . . . . . . 19--31
             Martin Garriga and   
            Cristian Mateos and   
              Andres Flores and   
          Alejandra Cechich and   
               Alejandro Zunino   RESTful service composition at a glance:
                                  a survey . . . . . . . . . . . . . . . . 32--53
                  Mina Nabi and   
               Maria Toeroe and   
                 Ferhat Khendek   Availability in the cloud: State of the
                                  art  . . . . . . . . . . . . . . . . . . 54--67
               Hazim Jarrah and   
            Nurul I. Sarkar and   
                Jairo Gutierrez   Comparison-based system-level fault
                                  diagnosis protocols for mobile ad-hoc
                                  networks: a survey . . . . . . . . . . . 68--81
               Subir Halder and   
                  Amrita Ghosal   A survey on mobility-assisted
                                  localization techniques in wireless
                                  sensor networks  . . . . . . . . . . . . 82--94
         Victor Prokhorenko and   
     Kim-Kwang Raymond Choo and   
                   Helen Ashman   Web application protection techniques: a
                                  taxonomy . . . . . . . . . . . . . . . . 95--112
                 Jose Moura and   
                David Hutchison   Review and analysis of networking
                                  challenges in cloud computing  . . . . . 113--129


Journal of Network and Computer Applications
Volume 61, Number ??, February, 2016

   Pritish Vijayanand Ghate and   
             Hemanta Kumar Pati   Collaborative distributed communication
                                  in heterogeneous environments: a
                                  comprehensive survey . . . . . . . . . . 1--20
        Alekha Kumar Mishra and   
              Ashok Kumar Turuk   A comparative analysis of node replica
                                  detection schemes in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 21--32
               Xiaonan Wang and   
               Hongbin Chen and   
                     Deguang Le   A novel IPv6 address configuration for a
                                  6LoWPAN-based WBAN . . . . . . . . . . . 33--45
            Petro P. Ernest and   
          Olabisi E. Falowo and   
                H. Anthony Chan   Design and performance evaluation of
                                  distributed mobility management schemes
                                  for network mobility . . . . . . . . . . 46--58
           Mojtaba Alizadeh and   
            Saeid Abolfazli and   
              Mazdak Zamani and   
           Sabariah Baharun and   
                Kouichi Sakurai   Authentication in mobile cloud
                                  computing: a survey  . . . . . . . . . . 59--80
    Mehdi Nazari Cheraghlou and   
         Ahmad Khadem-Zadeh and   
               Majid Haghparast   A survey of fault tolerance architecture
                                  in cloud computing . . . . . . . . . . . 81--92
                   Yu Xiang and   
             Zhaoguang Xuan and   
                  Meng Tang and   
                  Jun Zhang and   
                       Ming Sun   $3$D space detection and coverage of
                                  wireless sensor network based on spatial
                                  correlation  . . . . . . . . . . . . . . 93--101
                  Cuicui Lv and   
                 Qiang Wang and   
                 Wenjie Yan and   
                        Yi Shen   Energy-balanced compressive data
                                  gathering in Wireless Sensor Networks    102--114
              Omar Cheikhrouhou   Secure Group Communication in Wireless
                                  Sensor Networks: a survey  . . . . . . . 115--132
                Shruti Lall and   
           B. T. J. Maharaj and   
        P. A. Jansen van Vuuren   Null-frequency jamming of a proactive
                                  routing protocol in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 133--141
          Atslands R. Rocha and   
  Flávia C. Delicato and   
                Luci Pirmez and   
           Danielo G. Gomes and   
    José Neuman de Souza   A fully-decentralized semantic mechanism
                                  for autonomous wireless sensor nodes . . 142--160
              Krishan Kumar and   
               Arun Prakash and   
                Rajeev Tripathi   Spectrum handoff in cognitive radio
                                  networks: a classification and
                                  comprehensive survey . . . . . . . . . . 161--188
             Shun-Neng Yang and   
                 Shu-Wei Ho and   
                Yi-Bing Lin and   
                  Chai-Hien Gan   A multi-RAT bandwidth aggregation
                                  mechanism with software-defined
                                  networking . . . . . . . . . . . . . . . 189--198
            Adnan Akhunzada and   
              Abdullah Gani and   
           Nor Badrul Anuar and   
            Ahmed Abdelaziz and   
      Muhammad Khurram Khan and   
                 Amir Hayat and   
                  Samee U. Khan   Secure and dependable software defined
                                  networks . . . . . . . . . . . . . . . . 199--221
                  Tao Zhang and   
              Jianxing Wang and   
               Jiawei Huang and   
                   Yi Huang and   
                Jianer Chen and   
                         Yi Pan   Adaptive marking threshold method for
                                  delay-sensitive TCP in data center
                                  network  . . . . . . . . . . . . . . . . 222--234
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 62, Number ??, February, 2016

              Prosanta Gope and   
                 Tzonelih Hwang   An efficient mutual authentication and
                                  key agreement scheme preserving strong
                                  anonymity of the mobile user in global
                                  mobility networks  . . . . . . . . . . . 1--8
                Soo-Yeon Ji and   
            Bong-Keun Jeong and   
                Seonho Choi and   
                Dong Hyun Jeong   A multi-level intrusion detection method
                                  for abnormal network behaviors . . . . . 9--17
              Usman Shaukat and   
                 Ejaz Ahmed and   
                Zahid Anwar and   
                       Feng Xia   Cloudlet deployment in local wireless
                                  networks: Motivation, architectures,
                                  applications, and open challenges  . . . 18--40
               Athul Prasad and   
             Andreas Maeder and   
      Konstantinos Samdanis and   
               Andreas Kunz and   
                   Genadi Velev   Enabling group communication for public
                                  safety in LTE-Advanced networks  . . . . 41--52
              Zakira Inayat and   
              Abdullah Gani and   
           Nor Badrul Anuar and   
      Muhammad Khurram Khan and   
                   Shahid Anwar   Intrusion response systems: Foundations,
                                  design, and challenges . . . . . . . . . 53--74
              Heena Rathore and   
      Venkataramana Badarla and   
                   George K. J.   Sociopsychological trust model for
                                  Wireless Sensor Networks . . . . . . . . 75--87
                  Feng Tian and   
              Kuo-Ming Chao and   
                 Zuren Feng and   
                  Keyi Xing and   
                   Nazaraf Shah   Using a wireless visual sensor network
                                  to harmonically navigate multiple
                                  low-cost wheelchairs in an indoor
                                  environment  . . . . . . . . . . . . . . 88--99
                Peiyan Yuan and   
                   Ping Liu and   
                   Shaojie Tang   RIM: Relative-importance based data
                                  forwarding in people-centric networks    100--111
                    Hui Xia and   
                     Jia Yu and   
           Cheng-liang Tian and   
              Zhen-kuan Pan and   
                      Edwin Sha   Light-weight trust-enhanced on-demand
                                  multi-path routing in mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 112--127
               Chengwen Luo and   
                 Hande Hong and   
                 Long Cheng and   
             Mun Choon Chan and   
               Jianqiang Li and   
                     Zhong Ming   Accuracy-aware wireless indoor
                                  localization: Feasibility and
                                  applications . . . . . . . . . . . . . . 128--136
            Sultan Alneyadi and   
     Elankayer Sithirasenan and   
    Vallipuram Muthukkumarasamy   A survey on data leakage prevention
                                  systems  . . . . . . . . . . . . . . . . 137--152
               Mawloud Omar and   
           Hamida Boufaghes and   
              Lydia Mammeri and   
                Amel Taalba and   
                Abdelkamel Tari   Secure and reliable certificate chains
                                  recovery protocol for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 153--162
                Peiyan Yuan and   
                  Lilin Fan and   
                   Ping Liu and   
                   Shaojie Tang   Recent progress in routing protocols of
                                  mobile opportunistic networks: a clear
                                  taxonomy, analysis and evaluation  . . . 163--170
       Seyed Yahya Vaezpour and   
                  Rui Zhang and   
                     Kui Wu and   
              Jianping Wang and   
             Gholamali C. Shoja   A new approach to mitigating security
                                  risks of phone clone co-location over
                                  mobile clouds  . . . . . . . . . . . . . 171--184
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 63, Number ??, March, 2016

               Divya Saxena and   
            Vaskar Raychoudhury   Radient: Scalable, memory efficient name
                                  lookup algorithm for named data
                                  networking . . . . . . . . . . . . . . . 1--13
             Daniel-Ioan Curiac   Towards wireless sensor, actuator and
                                  robot networks: Conceptual framework,
                                  challenges and perspectives  . . . . . . 14--23
                Mengmeng Ge and   
     Kim-Kwang Raymond Choo and   
                    Huai Wu and   
                        Yong Yu   Survey on key revocation mechanisms in
                                  wireless sensor networks . . . . . . . . 24--38
                   Meng Han and   
               Mingyuan Yan and   
                Zhipeng Cai and   
                     Yingshu Li   An exploration of broader influence
                                  maximization in timeliness networks with
                                  opportunistic selection  . . . . . . . . 39--49
               Wen-Hwa Liao and   
               Ssu-Chi Kuai and   
                       Chen Liu   Efficient scheduling algorithm for
                                  multiple mobile subscriber stations with
                                  unsolicited grant service in an IEEE
                                  802.16e network  . . . . . . . . . . . . 50--55
           Hasan Abdulwahid and   
                    Bin Dai and   
             Benxiong Huang and   
                    Zijing Chen   Scheduled-links multicast routing
                                  protocol in MANETs . . . . . . . . . . . 56--67
            Wazir Zada Khan and   
        Md. Shohrab Hossain and   
       Mohammed Y. Aalsalem and   
                 N. M. Saad and   
           Mohammed Atiquzzaman   A cost analysis framework for claimer
                                  reporter witness based clone detection
                                  schemes in WSNs  . . . . . . . . . . . . 68--85
              Amrita Ghosal and   
                   Subir Halder   Lifespan prolonging location-wise
                                  predetermined deployment strategy for
                                  visual sensor networks . . . . . . . . . 86--97
                S. Avallone and   
                    G. Di Stasi   Design and implementation of WiMesh: a
                                  tool for the performance evaluation of
                                  multi-radio wireless mesh networks . . . 98--109
                    Hao Zhu and   
               Xiangke Liao and   
               Cees de Laat and   
                   Paola Grosso   Joint flow routing-scheduling for energy
                                  efficient software defined data center
                                  networks: a prototype of energy-aware
                                  network management platform  . . . . . . 110--124
                  Debao Wei and   
                 Libao Deng and   
                 Peng Zhang and   
                 Liyan Qiao and   
                    Xiyuan Peng   A page-granularity wear-leveling (PGWL)
                                  strategy for NAND flash memory-based
                                  sink nodes in wireless sensor networks   125--139
Álvaro López García and   
Enol Fernández del Castillo   Efficient image deployment in cloud
                                  environments . . . . . . . . . . . . . . 140--149
 Osamah Ibrahiem Abdullaziz and   
                Vik Tor Goh and   
             Huo-Chong Ling and   
                  KokSheik Wong   AIPISteg: an active IP identification
                                  based steganographic method  . . . . . . 150--158
        Emanuel F. Coutinho and   
           Paulo A. L. Rego and   
           Danielo G. Gomes and   
        José N. de Souza   Physics and microeconomics-based metrics
                                  for evaluating cloud computing
                                  elasticity . . . . . . . . . . . . . . . 159--172
               Diego Kreutz and   
     Oleksandr Malichevskyy and   
            Eduardo Feitosa and   
                 Hugo Cunha and   
      Rodrigo da Rosa Righi and   
        Douglas D. J. de Macedo   A cyber-resilient architecture for
                                  critical security services . . . . . . . 173--189
              Javier Suarez and   
               Jose Quevedo and   
                 Ivan Vidal and   
              Daniel Corujo and   
       Jaime Garcia-Reinoso and   
                  Rui L. Aguiar   A secure IoT management architecture
                                  based on Information-Centric Networking  190--204
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 64, Number ??, April, 2016

    Gilberto Fernandes, Jr. and   
           Luiz F. Carvalho and   
    Joel J. P. C. Rodrigues and   
Mario Lemes Proença, Jr.   Network anomaly detection using IP flows
                                  with Principal Component Analysis and
                                  Ant Colony Optimization  . . . . . . . . 1--11
      Syam Kumar Pasupuleti and   
     Subramanian Ramalingam and   
                 Rajkumar Buyya   An efficient and secure
                                  privacy-preserving approach for
                                  outsourced data of resource constrained
                                  mobile devices in cloud computing  . . . 12--22
             Jiangtao Zhang and   
               Hejiao Huang and   
                      Xuan Wang   Resource provision algorithms in cloud
                                  computing: a survey  . . . . . . . . . . 23--42
      Elias Chavarria-Reyes and   
               Etimad Fadel and   
           Suleiman Almasri and   
              M. G. Abbas Malik   Reducing the energy consumption at the
                                  user equipment through multi-stream
                                  cross-carrier-aware discontinuous
                                  reception (DRX) in LTE-advanced systems  43--61
             Enrico Gregori and   
         Alessandro Improta and   
            Luciano Lenzini and   
             Valerio Luconi and   
                Nilo Redini and   
                Alessio Vecchio   Smartphone-based crowdsourcing for
                                  estimating the bottleneck capacity in
                                  wireless networks  . . . . . . . . . . . 62--75
                 Waqar Asif and   
     Hassaan Khaliq Qureshi and   
    Muttukrishnan Rajarajan and   
                  Marios Lestas   Combined Banzhaf & Diversity Index (CBDI)
                                  for critical node detection  . . . . . . 76--88
                   Lien-Wu Chen   Cooperative energy-efficient
                                  localization with node lifetime
                                  extension in mobile long-thin networks   89--97
               Debdeep Paul and   
               Wen-De Zhong and   
                 Sanjay K. Bose   Energy efficient cloud service pricing:
                                  a two-timescale optimization approach    98--112
             Michel Barbeau and   
              Gimer Cervera and   
      Joaquin Garcia-Alfaro and   
             Evangelos Kranakis   Channel selection using a multiple radio
                                  model  . . . . . . . . . . . . . . . . . 113--123
         Márcio Melo and   
            Susana Sargento and   
                Jorge Carapinha   Optimal virtual network migration: a
                                  step closer for seamless resource
                                  mobility . . . . . . . . . . . . . . . . 124--136
                Yongrui Qin and   
              Quan Z. Sheng and   
     Nickolas J. G. Falkner and   
           Schahram Dustdar and   
                   Hua Wang and   
        Athanasios V. Vasilakos   When things matter: a survey on
                                  data-centric Internet of Things  . . . . 137--153
      Mustapha Reda Senouci and   
         Abdelhamid Mellouk and   
            Nadjib Aitsaadi and   
               Latifa Oukhellou   Fusion-based surveillance WSN deployment
                                  using Dempster--Shafer theory  . . . . . 154--166
                    Yan Liu and   
                  Shun-Zheng Yu   Network coding-based multisource content
                                  delivery in Content Centric Networking   167--175
             Atiq Ur Rahman and   
        Abdulrahman Alharby and   
           Halabi Hasbullah and   
               Khalid Almuzaini   Corona based deployment strategies in
                                  wireless sensor network: a survey  . . . 176--193
                 Cheng Zhan and   
                    Fuyuan Xiao   Coding based wireless broadcast
                                  scheduling in real time applications . . 194--203
                 Lingzhi Li and   
                   Zhe Yang and   
                   Jin Wang and   
               Shukui Zhang and   
                     Yanqin Zhu   Network coding with crowdsourcing-based
                                  trajectory estimation for vehicular
                                  networks . . . . . . . . . . . . . . . . 204--215
       Fabio Rafael Segundo and   
    Eraldo Silveira e Silva and   
             Jean-Marie Farines   A DTN routing strategy based on neural
                                  networks for urban bus transportation
                                  system . . . . . . . . . . . . . . . . . 216--228
       Bahareh Alami Milani and   
         Nima Jafari Navimipour   A comprehensive review of the data
                                  replication techniques in the cloud
                                  environments: Major trends and future
                                  directions . . . . . . . . . . . . . . . 229--238
           Hashim A. Hashim and   
               B. O. Ayinde and   
                    M. A. Abido   Optimal placement of relay nodes in
                                  wireless sensor network using artificial
                                  bee colony algorithm . . . . . . . . . . 239--248
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 65, Number ??, April, 2016

                Haitao Zhao and   
                   Jibo Wei and   
            Nurul I. Sarkar and   
                Shengchun Huang   E-MAC: an evolutionary solution for
                                  collision avoidance in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1--11
                 Mahir Kaya and   
      Altan Koçyigit and   
                  P. Erhan Eren   An adaptive mobile cloud computing
                                  framework using a call graph based model 12--35
                Jungwon Lee and   
                 Miran Shim and   
                    Hyesook Lim   Name prefix matching using bloom filter
                                  pre-searching for content centric
                                  network  . . . . . . . . . . . . . . . . 36--47
            Rahma Chaabouni and   
Marc Sánchez-Artigas and   
Pedro García-López and   
 Lluís P\`amies-Ju\`arez   The power of swarming in personal clouds
                                  under bandwidth budget . . . . . . . . . 48--71
                  Jihun Seo and   
                Keuchul Cho and   
               Wooseong Cho and   
                  Gisu Park and   
                      Kijun Han   A discovery scheme based on carrier
                                  sensing in self-organizing Bluetooth Low
                                  Energy networks  . . . . . . . . . . . . 72--83
              Wilson M. Tan and   
              Stephen A. Jarvis   Heuristic solutions to the target
                                  identifiability problem in directional
                                  sensor networks  . . . . . . . . . . . . 84--102
         Deepak Kumar Patel and   
         Devashree Tripathy and   
                 C. R. Tripathy   Survey of load balancing techniques for
                                  Grid . . . . . . . . . . . . . . . . . . 103--119
                    Ying Qu and   
                   Bryan Ng and   
                   Winston Seah   A survey of routing and channel
                                  assignment in multi-channel multi-radio
                                  WMNs . . . . . . . . . . . . . . . . . . 120--130
               Fida Gillani and   
              Ehab Al-Shaer and   
                 Basil AsSadhan   Economic metric to improve spam
                                  detectors  . . . . . . . . . . . . . . . 131--143
        Gopal Kirshna Shyam and   
            Sunilkumar S. Manvi   Virtual resource prediction in cloud
                                  environment: a Bayesian approach . . . . 144--154
          Mahmoud Khasawneh and   
              Saed Alrabaee and   
             Anjali Agarwal and   
               Nishith Goel and   
                   Marzia Zaman   Power trading in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 155--166
                 Chenhao Qu and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   A reliable and cost-efficient
                                  auto-scaling system for web applications
                                  using heterogeneous spot instances . . . 167--180
           Mohammed Atiquzzaman   Editorial: 2015 Best Paper Awards  . . . A1--A3
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 66, Number ??, May, 2016

           Gianluigi Folino and   
                Pietro Sabatino   Ensemble based collaborative and
                                  distributed intrusion detection systems:
                                  a survey . . . . . . . . . . . . . . . . 1--16
                 Neenu Garg and   
                     Seema Bawa   Comparative analysis of cloud data
                                  integrity auditing protocols . . . . . . 17--32
 Abayomi Moradeyo Otebolaku and   
           Maria Teresa Andrade   User context recognition using
                                  smartphone sensors and classification
                                  models . . . . . . . . . . . . . . . . . 33--51
                   Shiyi Li and   
                  Qiang Cao and   
              Shenggang Wan and   
                    Lu Qian and   
                 Changsheng Xie   HRSPC: a hybrid redundancy scheme via
                                  exploring computational locality to
                                  support fast recovery and high
                                  reliability in distributed storage
                                  systems  . . . . . . . . . . . . . . . . 52--63
           Mohammad Masdari and   
            Sima ValiKardan and   
                Zahra Shahi and   
               Sonay Imani Azar   Towards workflow scheduling in cloud
                                  computing: a comprehensive analysis  . . 64--82
          Pawan Kumar Verma and   
               Rajesh Verma and   
               Arun Prakash and   
             Ashish Agrawal and   
           Kshirasagar Naik and   
            Rajeev Tripathi and   
            Maazen Alsabaan and   
              Tarek Khalifa and   
           Tamer Abdelkader and   
           Abdulhakim Abogharaf   Machine-to-Machine (M2M) communications:
                                  a survey . . . . . . . . . . . . . . . . 83--105
           Mohammad Masdari and   
       Sayyid Shahab Nabavi and   
                    Vafa Ahmadi   An overview of virtual machine placement
                                  schemes in cloud computing . . . . . . . 106--127
            Fuu-Cheng Jiang and   
                  Ilsun You and   
                    Fang-Yi Leu   Approaching green sensor field using
                                  queue-based optimization technique . . . 128--136
        Jurairat Phuttharak and   
                   Seng W. Loke   Mobile crowdsourcing in peer-to-peer
                                  opportunistic networks: Energy usage and
                                  response analysis  . . . . . . . . . . . 137--150
            Yatish K. Joshi and   
                 Mohamed Younis   Restoring connectivity in a resource
                                  constrained WSN  . . . . . . . . . . . . 151--165
               Justin Grana and   
              David Wolpert and   
                Joshua Neil and   
               Dongping Xie and   
        Tanmoy Bhattacharya and   
                   Russell Bent   A likelihood ratio anomaly detector for
                                  identifying within-perimeter computer
                                  network attacks  . . . . . . . . . . . . 166--179
               Amna Qureshi and   
        David Megías and   
             Helena Rif\`a-Pous   PSUM: Peer-to-peer multimedia content
                                  distribution using collusion-resistant
                                  fingerprinting . . . . . . . . . . . . . 180--197
            David Airehrour and   
            Jairo Gutierrez and   
                Sayan Kumar Ray   Secure routing for Internet of Things: a
                                  survey . . . . . . . . . . . . . . . . . 198--213
               Suleman Khan and   
              Abdullah Gani and   
 Ainuddin Wahid Abdul Wahab and   
            Muhammad Shiraz and   
                 Iftikhar Ahmad   Network forensics: Review, taxonomy, and
                                  open challenges  . . . . . . . . . . . . 214--235
    Suvendu Kumar Mohapatra and   
         Prasan Kumar Sahoo and   
                    Shih-Lin Wu   Big data analytic architecture for
                                  intruder detection in heterogeneous
                                  wireless sensor networks . . . . . . . . 236--249
                 Li Chunlin and   
                    Yan Xin and   
                      Li LaYuan   Flexible service provisioning based on
                                  context constraint for enhancing user
                                  experience in service oriented mobile
                                  cloud  . . . . . . . . . . . . . . . . . 250--261
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 67, Number ??, May, 2016

              Rahim Masoudi and   
                   Ali Ghaffari   Software defined networks: a survey  . . 1--25
      Suchetana Chakraborty and   
         Sandip Chakraborty and   
              Sukumar Nandi and   
              Sushanta Karmakar   Impact of redundant sensor deployment
                                  over data gathering performance: a model
                                  based approach . . . . . . . . . . . . . 26--42
                      Xuxun Liu   A novel transmission range adjustment
                                  strategy for energy hole avoiding in
                                  wireless sensor networks . . . . . . . . 43--52
           Huda Saleh Abbas and   
                Mark A. Gregory   The next generation of passive optical
                                  networks: a review . . . . . . . . . . . 53--74
              Mathias Pelka and   
           Horst Hellbrück   Survey of challenges and towards a
                                  unified architecture for location
                                  systems  . . . . . . . . . . . . . . . . 75--85
             Peter Bartalos and   
                     Yi Wei and   
             M. Brian Blake and   
          Haluk Damgacioglu and   
                 Iman Saleh and   
                   Nurcin Celik   Modeling energy-aware web services and
                                  application  . . . . . . . . . . . . . . 86--98
         Manuel Díaz and   
     Cristian Martín and   
         Bartolomé Rubio   State-of-the-art, challenges, and open
                                  issues in the integration of Internet of
                                  Things and cloud computing . . . . . . . 99--117
              Eisa Zarepour and   
       Abdul Alim Abd Karim and   
                Ajay Sharma and   
              Mahbub Hassan and   
              Aruna Seneviratne   Characterizing power saving for
                                  device-to-device browser cache
                                  cooperation  . . . . . . . . . . . . . . 118--127
                   Sobin CC and   
        Vaskar Raychoudhury and   
             Gustavo Marfia and   
                  Ankita Singla   A survey of routing and data
                                  dissemination in Delay Tolerant Networks 128--146
           Opeyemi Osanaiye and   
     Kim-Kwang Raymond Choo and   
                  Mqhele Dlodlo   Distributed denial of service (DDoS)
                                  resilience in cloud: Review and
                                  conceptual cloud DDoS mitigation
                                  framework  . . . . . . . . . . . . . . . 147--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 68, Number ??, June, 2016

                Nauman Ahad and   
               Junaid Qadir and   
                    Nasir Ahsan   Neural networks in wireless networks:
                                  Techniques, applications and guidelines  1--27
               Maxim Claeys and   
       Daphné Tuncer and   
              Jeroen Famaey and   
      Marinos Charalambides and   
        Steven Latré and   
              George Pavlou and   
                 Filip De Turck   Hybrid multi-tenant cache management for
                                  virtualized ISP networks . . . . . . . . 28--41
                   Anum Ali and   
             Ghalib A. Shah and   
                  Junaid Arshad   Energy efficient techniques for M2M
                                  communication: a survey  . . . . . . . . 42--55
               Zhiming Wang and   
              Xiaoping Zeng and   
                    Xue Liu and   
                     Man Xu and   
                     Ya Wen and   
                        Li Chen   TCP congestion control algorithm for
                                  heterogeneous Internet . . . . . . . . . 56--64
                  Yunhe Cui and   
               Lianshan Yan and   
                  Saifei Li and   
               Huanlai Xing and   
                    Wei Pan and   
                   Jian Zhu and   
                 Xiaoyang Zheng   SD-Anti-DDoS: Fast and efficient DDoS
                                  defense in software-defined networks . . 65--79
             Han-Peng Jiang and   
                David Chuck and   
                   Wei-Mei Chen   Energy-aware data center networks  . . . 80--89
             Aisha Abdallah and   
        Mohd Aizaini Maarof and   
                 Anazida Zainal   Fraud detection system: a survey . . . . 90--113
               Tran The Son and   
                Hoa Le-Minh and   
                   Nauman Aslam   MSAR: a metric self-adaptive routing
                                  model for Mobile Ad Hoc Networks . . . . 114--125
                 Wenjuan Li and   
                Weizhi Meng and   
                   Lam For Kwok   A survey on OpenFlow-based Software
                                  Defined Networks: Security challenges
                                  and countermeasures  . . . . . . . . . . 126--139
                   Yang Qin and   
               Weihong Yang and   
                   Yibin Ye and   
                        Yao Shi   Analysis for TCP in data center
                                  networks: Outcast and Incast . . . . . . 140--150
                  Wenbin Hu and   
                 Zhenyu Qiu and   
                  Huan Wang and   
                     Liping Yan   A Real-time scheduling algorithm for
                                  on-demand wireless XML data broadcasting 151--163
     Bijoy Chand Chatterjee and   
                Waya Fadini and   
                       Eiji Oki   A spectrum allocation scheme based on
                                  first-last-exact fit policy for elastic
                                  optical networks . . . . . . . . . . . . 164--172
   Syed Hamid Hussain Madni and   
 Muhammad Shafie Abd Latiff and   
           Yahaya Coulibaly and   
    Shafi'i Muhammad Abdulhamid   Resource scheduling for infrastructure
                                  as a service (IaaS) in cloud computing:
                                  Challenges and opportunities . . . . . . 173--200
                Weizhi Meng and   
               Wang Hao Lee and   
               S. R. Murali and   
              S. P. T. Krishnan   JuiceCaster: Towards automatic juice
                                  filming attacks on smartphones . . . . . 201--212
                P. V. Bindu and   
             P. Santhi Thilagam   Mining social networks for anomalies:
                                  Methods and challenges . . . . . . . . . 213--229
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 69, Number ??, July, 2016

         Alex F. R. Trajano and   
           Marcial P. Fernandez   Two-phase load balancing of In-Memory
                                  Key-Value Storages using Network
                                  Functions Virtualization (NFV) . . . . . 1--13
          Xavier Hesselbach and   
    Jos\`e Roberto Amazonas and   
           Santi Villanueva and   
             Juan Felipe Botero   Coordinated node and link mapping VNE
                                  using a new paths algebra strategy . . . 14--26
               T. Panigrahi and   
            Meenakshi Panda and   
                       G. Panda   Fault tolerant distributed estimation in
                                  wireless sensor networks . . . . . . . . 27--39
               Cezar Plesca and   
         Vincent Charvillat and   
                  Wei Tsang Ooi   Multimedia prefetching with optimal
                                  Markovian policies . . . . . . . . . . . 40--53
        Sally E. El Khawaga and   
             Ahmed I. Saleh and   
                  Hesham A. Ali   An Administrative Cluster-based
                                  Cooperative Caching (ACCC) strategy for
                                  Mobile Ad Hoc Networks . . . . . . . . . 54--76
        Ado Adamou Abba Ari and   
          Blaise Omer Yenke and   
            Nabila Labraoui and   
            Irepran Damakoa and   
               Abdelhak Gueroui   A power efficient cluster-based routing
                                  algorithm for wireless sensor networks:
                                  Honeybees swarm intelligence based
                                  approach . . . . . . . . . . . . . . . . 77--97
            Rafael L. Gomes and   
        Luiz F. Bittencourt and   
      Edmundo R. M. Madeira and   
          Eduardo Cerqueira and   
                    Mario Gerla   A combined energy-bandwidth approach to
                                  allocate resilient virtual software
                                  defined networks . . . . . . . . . . . . 98--106
                Du Yuanfeng and   
               Yang Dongkai and   
                Yang Huilin and   
                     Xiu Chundi   Flexible indoor localization and
                                  tracking system based on mobile phone    107--116
            V. K. Mohan Raj and   
                     R. Shriram   Power management in virtualized
                                  datacenter --- a survey  . . . . . . . . 117--133
           Francisco Moyano and   
      Carmen Fernandez-Gago and   
                   Javier Lopez   A model-driven approach for engineering
                                  trust and reputation into software
                                  services . . . . . . . . . . . . . . . . 134--151
                Cuong T. Do and   
             Nguyen H. Tran and   
                Eui-Nam Huh and   
           Choong Seon Hong and   
               Dusit Niyato and   
                        Zhu Han   Dynamics of service selection and
                                  provider pricing game in heterogeneous
                                  cloud market . . . . . . . . . . . . . . 152--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 70, Number ??, July, 2016

  Marcelo Caggiani Luizelli and   
      Leonardo Richter Bays and   
      Luciana Salete Buriol and   
    Marinho Pilla Barcellos and   
       Luciano Paschoal Gaspary   How physical network topologies affect
                                  virtual network embedding quality: a
                                  characterization study based on ISP and
                                  datacenter networks  . . . . . . . . . . 1--16
       Ali Mohammad Saghiri and   
          Mohammad Reza Meybodi   An approach for designing cognitive
                                  engines in cognitive peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 17--40
                Jianwei Niu and   
                   Lei Wang and   
                 Xiting Liu and   
                        Shui Yu   FUIR: Fusing user and item information
                                  to deal with data sparsity by using side
                                  information in recommendation systems    41--50
           Tekenate E. Amah and   
               Maznah Kamat and   
             Waldir Moreira and   
    Kamalrulnizam Abu Bakar and   
             Satria Mandala and   
              Marcos A. Batista   Towards next-generation routing
                                  protocols for pocket switched networks   51--88
               Xiaoming Liu and   
                Yadong Zhou and   
               Chengchen Hu and   
                  Xiaohong Guan   MIRACLE: a multiple independent random
                                  walks community parallel detection
                                  algorithm for big graphs . . . . . . . . 89--101
       Carlos Barba-Jimenez and   
       Raul Ramirez-Velarde and   
           Andrei Tchernykh and   
Ramón Rodríguez-Dagnino and   
        Juan Nolazco-Flores and   
             Raul Perez-Cazares   Cloud based Video-on-Demand service
                                  model ensuring quality of service and
                                  scalability  . . . . . . . . . . . . . . 102--113
                Fatih Senel and   
                 Mohamed Younis   Novel relay node placement algorithms
                                  for establishing connected topologies    114--130
           Juan Antonio Cordero   Multi-path TCP performance evaluation in
                                  dual-homed (wired/wireless) devices  . . 131--139
              Muhammad Anan and   
              Ala Al-Fuqaha and   
               Nidal Nasser and   
                 Ting-Yu Mu and   
                 Husnain Bustam   Empowering networking research and
                                  experimentation through Software-Defined
                                  Networking . . . . . . . . . . . . . . . 140--155
                 Fuliang Li and   
                Jiahai Yang and   
               Xingwei Wang and   
                   Tian Pan and   
               Changqing An and   
                    Jianping Wu   Characteristics analysis at prefix
                                  granularity: a case study in an IPv6
                                  network  . . . . . . . . . . . . . . . . 156--170
                  Jian Peng and   
     Kim-Kwang Raymond Choo and   
                   Helen Ashman   Bit-level $n$-gram based forensic
                                  authorship analysis on social media:
                                  Identifying individuals from linguistic
                                  profiles . . . . . . . . . . . . . . . . 171--182
                    Lin Xue and   
                Suman Kumar and   
                  Cheng Cui and   
    Praveenkumar Kondikoppa and   
              Chui-Hui Chiu and   
                Seung-Jong Park   Towards fair and low latency next
                                  generation high speed networks: AFCD
                                  queuing  . . . . . . . . . . . . . . . . 183--193
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 71, Number ??, August, 2016

   Mahdi Nasrullah Al-Ameen and   
                 Matthew Wright   iPersea: Towards improving the
                                  Sybil-resilience of social DHT . . . . . 1--10
              Minhaj Ahmad Khan   A survey of security issues for cloud
                                  computing  . . . . . . . . . . . . . . . 11--29
                  Hang Shen and   
                   Guangwei Bai   Routing in wireless multimedia sensor
                                  networks: a survey and challenges ahead  30--49
               Melike Yigit and   
            V. Cagri Gungor and   
               Etimad Fadel and   
               Laila Nassef and   
              Nadine Akkari and   
                Ian F. Akyildiz   Channel-aware routing and priority-aware
                                  multi-channel scheduling for WSN-based
                                  smart grid applications  . . . . . . . . 50--58
 L. González-Manzano and   
  José M. de Fuentes and   
            Sergio Pastrana and   
          Pedro Peris-Lopez and   
  Luis Hernández-Encinas   PAgIoT --- Privacy-preserving
                                  Aggregation protocol for Internet of
                                  Things . . . . . . . . . . . . . . . . . 59--71
         Nusrat Zerin Zenia and   
            Mohammed Aseeri and   
          Muhammad R. Ahmed and   
       Zamshed I. Chowdhury and   
               M. Shamim Kaiser   Energy-efficiency and reliability in MAC
                                  and routing protocols for underwater
                                  wireless sensor network: a survey  . . . 72--85
     Alireza Sadeghi Milani and   
         Nima Jafari Navimipour   Load balancing mechanisms and techniques
                                  in the cloud environments: Systematic
                                  literature review and future trends  . . 86--98
             Pimmy Gandotra and   
               Rakesh Kumar Jha   Device-to-Device Communication in
                                  Cellular Networks: a Survey  . . . . . . 99--117
            Rodrigo R. Esch and   
        Fábio Protti and   
              Valmir C. Barbosa   Adaptive event sensing in networks of
                                  autonomous mobile agents . . . . . . . . 118--129
                Mahda Noura and   
               Rosdiadee Nordin   A survey on interference management for
                                  Device-to-Device (D2D) communication and
                                  its challenges in 5G networks  . . . . . 130--150
              Aisha Siddiqa and   
Ibrahim Abaker Targio Hashem and   
               Ibrar Yaqoob and   
             Mohsen Marjani and   
   Shahabuddin Shamshirband and   
              Abdullah Gani and   
              Fariza Nasaruddin   A survey of big data management:
                                  Taxonomy and state-of-the-art  . . . . . 151--166
              Jingyuan Wang and   
               Jiangtao Wen and   
                  Jun Zhang and   
                Zhang Xiong and   
                     Yuxing Han   TCP-FIT: an improved TCP algorithm for
                                  heterogeneous networks . . . . . . . . . 167--180
              Manel Seddiki and   
           Mahfoud Bencha\"\iba   2P-Lookup: Popularity and Proximity
                                  based P2P Lookup mechanism over MANETs   181--193
         João Santos and   
    Joel J. P. C. Rodrigues and   
          Bruno M. C. Silva and   
          João Casal and   
              Kashif Saleem and   
                 Victor Denisov   An IoT-based mobile gateway for
                                  intelligent personal assistants on
                                  mobile health environments . . . . . . . 194--204
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 72, Number ??, September, 2016

              Mohamed Attia and   
          Hichem Sedjelmaci and   
      Sidi Mohammed Senouci and   
              El-Hassane Aglzim   Game model to optimally combine electric
                                  vehicles with green and non-green
                                  sources into an end-to-end smart grid
                                  architecture . . . . . . . . . . . . . . 1--13
                  Jian Peng and   
     Kim-Kwang Raymond Choo and   
                   Helen Ashman   User profiling in intrusion detection: a
                                  review . . . . . . . . . . . . . . . . . 14--27
               Kishor Singh and   
                    Sangman Moh   Routing protocols in cognitive radio ad
                                  hoc networks: a comprehensive review . . 28--37
                 Rana Azzam and   
              Rabeb Mizouni and   
                 Hadi Otrok and   
                 Anis Ouali and   
                   Shakti Singh   GRS: a Group-Based Recruitment System
                                  for Mobile Crowd Sensing . . . . . . . . 38--50
             M. R. M. Assis and   
              L. F. Bittencourt   A survey on cloud federation
                                  architectures: Identifying functional
                                  and non-functional properties  . . . . . 51--71
        Sakib Md. Bin Malek and   
         Md. Muntakim Sadik and   
                 Ashikur Rahman   On balanced $k$-coverage in visual
                                  sensor networks  . . . . . . . . . . . . 72--86
Shilpa Shashikant Chaudhari and   
         Rajashekhar C. Biradar   Traffic and mobility aware resource
                                  prediction using cognitive agent in
                                  mobile ad hoc networks . . . . . . . . . 87--103
                    Tie Qiu and   
                    Yuan Lv and   
                   Feng Xia and   
                  Ning Chen and   
                  Jiafu Wan and   
                      Amr Tolba   ERGID: an efficient routing protocol for
                                  emergency response Internet of Things    104--112
         Hassen A. Mogaibel and   
             Mohamed Othman and   
        Shamala Subramaniam and   
    Nor Asilah Wati Abdul Hamid   Review of channel assignment approaches
                                  in multi-radio multi-channel wireless
                                  mesh network . . . . . . . . . . . . . . 113--139
                Jingyu Feng and   
                Guangyue Lu and   
              Honggang Wang and   
                  Xuanhong Wang   Supporting secure spectrum sensing data
                                  transmission against SSDH attack in
                                  cognitive radio ad hoc networks  . . . . 140--149
                 C. Hamdeni and   
                T. Hamrouni and   
                F. Ben Charrada   Data popularity measurements in
                                  distributed systems: Survey and design
                                  directions . . . . . . . . . . . . . . . 150--161
               Xiaochen Hao and   
                Weijing Liu and   
                   Ning Yao and   
                 Dehua Geng and   
                        Xida Li   Distributed topology construction
                                  algorithm to improve link quality and
                                  energy efficiency for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 162--170
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 73, Number ??, September, 2016

                    Xian Li and   
               Qiuling Tang and   
                   Changyin Sun   The impact of node position on outage
                                  performance of RF energy powered
                                  wireless sensor communication links in
                                  overlaid deployment scenario . . . . . . 1--11
           Ubaid Ullah Khan and   
            Naqqash Dilshad and   
    Mubashir Husain Rehmani and   
                     Tariq Umer   Fairness in Cognitive Radio Networks:
                                  Models, measurement methods,
                                  applications, and future research
                                  directions . . . . . . . . . . . . . . . 12--26
              Mehrnaz Moudi and   
             Mohamed Othman and   
              Kweh Yeah Lun and   
      Amir Rizaan Abdul Rahiman   $x$-Folded TM: an efficient topology for
                                  interconnection networks . . . . . . . . 27--34
               M. Kaliappan and   
            Susan Augustine and   
                 B. Paramasivan   Enhancing energy efficiency and load
                                  balancing in mobile ad hoc network using
                                  dynamic genetic algorithms . . . . . . . 35--43
                   Song Han and   
                  Xinbin Li and   
                 Zhixin Liu and   
                   Xinping Guan   Hierarchical-game-based algorithm for
                                  downlink joint subchannel and power
                                  allocation in OFDMA femtocell networks   44--56
             Aimad Karkouch and   
            Hajar Mousannif and   
       Hassan Al Moatassime and   
                    Thomas Noel   Data quality in Internet of Things: a
                                  state-of-the-art survey  . . . . . . . . 57--81
                 Guidan Yao and   
                Zhigang Jin and   
                      Yishan Su   An environment-friendly spectrum
                                  decision strategy for underwater
                                  acoustic networks  . . . . . . . . . . . 82--93
                  K. Ivesic and   
            L. Skorin-Kapov and   
                 M. Matijasevic   Corrigendum to: ``Cross-layer QoE-driven
                                  admission control and resource
                                  allocation for adaptive multimedia
                                  services in LTE'' [J. Netw. Comput.
                                  Appl. \bf 46 (2014) 336--351]  . . . . . 94--97
                Tien Van Do and   
                  Nam H. Do and   
Ádám Horváth and   
                   Jinting Wang   Corrigendum to ``Modelling opportunistic
                                  spectrum renting in mobile cellular
                                  networks'' [J. Netw. Comput. Appl. 52
                                  (2015) 129--138] . . . . . . . . . . . . 98
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 74, Number ??, October, 2016

                   Feng Lin and   
                  Gang Wang and   
                Junhai Zhou and   
               Shiwen Zhang and   
                        Xin Yao   High-performance IPv6 address lookup in
                                  GPU-accelerated software routers . . . . 1--10
               Yanchao Zhao and   
                Wenzhong Li and   
                      Sanglu Lu   Navigation-driven handoff minimization
                                  in wireless networks . . . . . . . . . . 11--20
                   Lin Tang and   
                    Hui Cao and   
                   Li Zheng and   
                 Ningjian Huang   Uncertainty-aware RFID network planning
                                  for target detection and target location 21--30
               Kirill Kogan and   
Alejandro López-Ortiz and   
        Sergey I. Nikolenko and   
           Gabriel Scalosub and   
                  Michael Segal   Large profits or fast gains: a dilemma
                                  in maximizing throughput with
                                  applications to network processors . . . 31--43
                   Chen Lyu and   
               Shi-Feng Sun and   
             Yuanyuan Zhang and   
                 Amit Pande and   
                 Haining Lu and   
                        Dawu Gu   Privacy-preserving data sharing scheme
                                  over cloud for social applications . . . 44--55
               Manas Khatua and   
                    Sudip Misra   Exploiting anomalous slots for multiple
                                  channel access in IEEE 802.11 networks   56--65
              Yogesh Sharma and   
              Bahman Javadi and   
                Weisheng Si and   
                     Daniel Sun   Reliability and energy efficiency in
                                  cloud computing systems: Survey and
                                  taxonomy . . . . . . . . . . . . . . . . 66--85
  Daniel Ricardo dos Santos and   
            Roberto Marinho and   
    Gustavo Roecker Schmitt and   
     Carla Merkle Westphall and   
        Carlos Becker Westphall   A framework and risk assessment
                                  approaches for risk-based access control
                                  in the cloud . . . . . . . . . . . . . . 86--97
               Salman Iqbal and   
        Miss Laiha Mat Kiah and   
            Babak Dhaghighi and   
           Muzammil Hussain and   
               Suleman Khan and   
      Muhammad Khurram Khan and   
         Kim-Kwang Raymond Choo   On cloud security attacks: a taxonomy
                                  and intrusion detection and prevention
                                  as a service . . . . . . . . . . . . . . 98--120
            Miguel Sepulcre and   
            Javier Gozalvez and   
         Baldomero Coll-Perales   Multipath QoS-driven routing protocol
                                  for industrial wireless networks . . . . 121--132
           Michael Emmanuel and   
                  Ramesh Rayudu   Communication technologies for smart
                                  grid applications: a survey  . . . . . . 133--148
             Chun-Cheng Lin and   
             Teng-Huei Chen and   
                  Hui-Hsin Chin   Adaptive router node placement with
                                  gateway positions and QoS constraints in
                                  dynamic wireless mesh networks . . . . . 149--164
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 75, Number ??, November, 2016

               Hafsa Zannat and   
              Taslima Akter and   
            Mashrura Tasnim and   
                 Ashikur Rahman   The coverage problem in visual sensor
                                  networks: a target oriented approach . . 1--15
           Dimitrios Zorbas and   
   Luigi Di Puglia Pugliese and   
     Tahiry Razafindralambo and   
            Francesca Guerriero   Optimal drone placement and
                                  cost-efficient target coverage . . . . . 16--31
             Yousri Daldoul and   
      Djamal-Eddine Meddour and   
               Toufik Ahmed and   
                  Raouf Boutaba   Block Negative Acknowledgement protocol
                                  for reliable multicast in IEEE 802.11    32--46
          Ranesh Kumar Naha and   
                 Mohamed Othman   Cost-aware service brokering and
                                  performance sentient load balancing
                                  algorithms in the cloud  . . . . . . . . 47--57
       Mohd Faizal Ab Razak and   
           Nor Badrul Anuar and   
               Rosli Salleh and   
                  Ahmad Firdaus   The rise of ``malware'': Bibliometric
                                  analysis of malware study  . . . . . . . 58--76
          Pawan Kumar Verma and   
               Rajesh Verma and   
               Arun Prakash and   
            Rajeev Tripathi and   
               Kshirasagar Naik   A novel hybrid medium access control
                                  protocol for inter-M2M communications    77--88
              Qiaoyun Zhang and   
                Guilin Chen and   
                 Liang Zhao and   
                Chih-Yung Chang   Piconet construction and restructuring
                                  mechanisms for interference avoiding in
                                  Bluetooth PANs . . . . . . . . . . . . . 89--100
        Ricardo Marco Alaez and   
     Jose M. Alcaraz Calero and   
             Fatna Belqasmi and   
             May El-Barachi and   
              Mohamad Badra and   
                   Omar Alfandi   Towards an open source architecture for
                                  multi-operator LTE core networks . . . . 101--109
               M. D'Arienzo and   
                   S. P. Romano   GOSPF: an energy efficient
                                  implementation of the OSPF routing
                                  protocol . . . . . . . . . . . . . . . . 110--127
                 Ozgur Ates and   
              Selcuk Keskin and   
                   Taskin Kocak   High throughput graphics processing unit
                                  based Fano decoder . . . . . . . . . . . 128--137
              Deval Bhamare and   
                   Raj Jain and   
            Mohammed Samaka and   
                    Aiman Erbad   A survey on service function chaining    138--155
                Jin B. Hong and   
                 Dong Seong Kim   Towards scalable security analysis using
                                  multi-layered security models  . . . . . 156--168
             Satoshi Utsumi and   
Salahuddin Muhammad Salim Zabir and   
                Sumet Prabhavat   A new explicit congestion notification
                                  scheme for satellite IP networks . . . . 169--180
Charalampos Konstantopoulos and   
          Grammati Pantziou and   
         Ioannis E. Venetis and   
               Damianos Gavalas   Efficient event handling in Wireless
                                  Sensor and Actor Networks: an on-line
                                  computation approach . . . . . . . . . . 181--199
              Saurabh Singh and   
            Young-Sik Jeong and   
                 Jong Hyuk Park   A survey on cloud computing security:
                                  Issues, threats, and solutions . . . . . 200--222
             Yaser Mansouri and   
                 Rajkumar Buyya   To move or not to move: Cost
                                  optimization in a dual cloud-based
                                  storage architecture . . . . . . . . . . 223--235
                 Sana Habib and   
               Junaid Qadir and   
                 Anwaar Ali and   
              Durdana Habib and   
                    Ming Li and   
            Arjuna Sathiaseelan   The past, present, and future of
                                  transport-layer multipath  . . . . . . . 236--258
       Nor Bakiah Abd Warif and   
 Ainuddin Wahid Abdul Wahab and   
     Mohd Yamani Idna Idris and   
              Roziana Ramli and   
               Rosli Salleh and   
   Shahaboddin Shamshirband and   
         Kim-Kwang Raymond Choo   Copy--move forgery detection: Survey,
                                  challenges and future directions . . . . 259--278
                 Waqar Asif and   
              Marios Lestas and   
     Hassaan Khaliq Qureshi and   
        Muttukrishnan Rajarajan   Optimization based spectral partitioning
                                  for node criticality assessment  . . . . 279--292
           Paulo Bartolomeu and   
              Muhammad Alam and   
           Joaquim Ferreira and   
            José Fonseca   Survey on low power real-time wireless
                                  MAC protocols  . . . . . . . . . . . . . 293--316
                  Abid Khan and   
             Farhana Jabeen and   
                  Farah Naz and   
               Sabah Suhail and   
              Mansoor Ahmed and   
                  Sarfraz Nawaz   Buyer seller watermarking protocols
                                  issues and challenges --- a survey . . . 317--334
               Junaid Shuja and   
              Abdullah Gani and   
   Muhammad Habib ur Rehman and   
                 Ejaz Ahmed and   
           Sajjad A. Madani and   
      Muhammad Khurram Khan and   
                    Kwangman Ko   Towards native code offloading based MCC
                                  frameworks for multimedia applications:
                                  a survey . . . . . . . . . . . . . . . . 335--354
                Minjae Park and   
                   Hyun Ahn and   
              Kwanghoon Pio Kim   Workflow-supported social networks:
                                  Discovery, analyses, and system  . . . . 355--373
                   Xun Shao and   
            Masahiro Jibiki and   
          Yuuichi Teranishi and   
               Nozomu Nishinaga   A virtual replica node-based flash
                                  crowds alleviation method for sensor
                                  overlay networks . . . . . . . . . . . . 374--384
            Nusrat Nowsheen and   
              Gour Karmakar and   
            Joarder Kamruzzaman   PRADD: a path reliability-aware data
                                  delivery protocol for underwater
                                  acoustic sensor networks . . . . . . . . 385--397
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 76, Number ??, December, 2016

             Dilara Acarali and   
    Muttukrishnan Rajarajan and   
             Nikos Komninos and   
                    Ian Herwono   Survey of approaches and features for
                                  the identification of HTTP-based botnet
                                  traffic  . . . . . . . . . . . . . . . . 1--15
                 Laisen Nie and   
               Dingde Jiang and   
                    Lei Guo and   
                        Shui Yu   Traffic matrix prediction and estimation
                                  based on deep learning in large-scale IP
                                  backbone networks  . . . . . . . . . . . 16--22
             Nazmus S. Nafi and   
            Khandakar Ahmed and   
            Mark A. Gregory and   
                    Manoj Datta   A survey of smart grid architectures,
                                  applications, benefits and
                                  standardization  . . . . . . . . . . . . 23--36
                   Qi Jiang and   
                Jianfeng Ma and   
                 Fushan Wei and   
              Youliang Tian and   
                  Jian Shen and   
                  Yuanyuan Yang   An untraceable temporal-credential-based
                                  two-factor authentication scheme using
                                  ECC for wireless sensor networks . . . . 37--48
            Parisa Goudarzi and   
     Hadi Tabatabaee Malazi and   
                 Mahmood Ahmadi   Khorramshahr: a scalable peer to peer
                                  architecture for port warehouse
                                  management system  . . . . . . . . . . . 49--59
                Chun-Nan Lu and   
            Chun-Ying Huang and   
               Ying-Dar Lin and   
                 Yuan-Cheng Lai   High performance traffic classification
                                  based on message size sequence and
                                  distribution . . . . . . . . . . . . . . 60--74
                Ehsan Ahvar and   
Nafiseh Daneshgar-Moghaddam and   
           Antonio M. Ortiz and   
             Gyu Myoung Lee and   
                    Noel Crespi   On analyzing user location discovery
                                  methods in smart homes: a taxonomy and
                                  survey . . . . . . . . . . . . . . . . . 75--86
             Ren-Hung Hwang and   
              Yu-Ling Hsueh and   
               Jang-Jiin Wu and   
                   Fu-Hui Huang   SocialHide: a generic distributed
                                  framework for location privacy
                                  protection . . . . . . . . . . . . . . . 87--100
               Divya Saxena and   
            Vaskar Raychoudhury   N-FIB: Scalable, memory efficient
                                  name-based forwarding  . . . . . . . . . 101--109
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 77, Number ??, January 1, 2017

           Dimitris Tsolkas and   
              Eirini Liotou and   
               Nikos Passas and   
                Lazaros Merakos   A survey on parametric QoE estimation
                                  for popular services . . . . . . . . . . 1--17
              Preeti Mishra and   
          Emmanuel S. Pilli and   
         Vijay Varadharajan and   
                 Udaya Tupakula   Intrusion detection techniques in cloud
                                  environment: a survey  . . . . . . . . . 18--47
        Gyanappa A. Walikar and   
          Rajashekar C. Biradar   A survey on hybrid routing mechanisms in
                                  mobile ad hoc networks . . . . . . . . . 48--63
               Baogui Huang and   
                   Jiguo Yu and   
              Xiuzhen Cheng and   
              Honglong Chen and   
                       Hang Liu   SINR based shortest link scheduling with
                                  oblivious power control in wireless
                                  networks . . . . . . . . . . . . . . . . 64--72
              Fariba Aznoli and   
         Nima Jafari Navimipour   Cloud services recommendation: Reviewing
                                  the recent advances and suggesting the
                                  future research directions . . . . . . . 73--86
              Misbah Liaqat and   
               Victor Chang and   
              Abdullah Gani and   
      Siti Hafizah Ab Hamid and   
            Muhammad Toseef and   
                Umar Shoaib and   
                Rana Liaqat Ali   Federated cloud resource management:
                                  Review and discussion  . . . . . . . . . 87--105
            Fahimeh Dabaghi and   
            Zeinab Movahedi and   
                    Rami Langar   A survey on green routing protocols
                                  using sleep-scheduling in wired networks 106--122
                 Long Cheng and   
                Jianwei Niu and   
                Linghe Kong and   
               Chengwen Luo and   
                      Yu Gu and   
                   Wenbo He and   
                   Sajal K. Das   Compressive sensing based data quality
                                  improvement for crowd-sensing
                                  applications . . . . . . . . . . . . . . 123--134
                 Wenjuan Li and   
                Weizhi Meng and   
               Lam-For Kwok and   
                Horace H. S. Ip   Enhancing collaborative intrusion
                                  detection networks against insider
                                  attacks using supervised intrusion
                                  sensitivity-based trust management model 135--145
                   Chen Lin and   
               Zhidong Shen and   
                  Qian Chen and   
           Frederick T. Sheldon   A data integrity verification scheme in
                                  mobile cloud computing . . . . . . . . . 146--151
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 78, Number ??, January 15, 2017

            Tshiamo Sigwele and   
                Atm S. Alam and   
            Prashant Pillai and   
                      Yim F. Hu   Energy-efficient cloud radio access
                                  networks by cloud based workload
                                  consolidation for 5G . . . . . . . . . . 1--8
             Pimmy Gandotra and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   A survey on device-to-device (D2D)
                                  communication: Architecture and security
                                  issues . . . . . . . . . . . . . . . . . 9--29
        Giuseppina Garofalo and   
            Andrea Giordano and   
              Patrizia Piro and   
      Giandomenico Spezzano and   
                   Andrea Vinci   A distributed real-time approach for
                                  mitigating CSO and flooding in urban
                                  drainage systems . . . . . . . . . . . . 30--42
             Ehsan Arianyan and   
              Hassan Taheri and   
                 Vahid Khoshdel   Novel fuzzy multi objective DVFS-aware
                                  consolidation heuristics for energy and
                                  SLA efficient resource management in
                                  cloud data centers . . . . . . . . . . . 43--61
                Xiumin Wang and   
              Xiaoming Chen and   
                  Chau Yuen and   
                  Weiwei Wu and   
                 Meng Zhang and   
                     Cheng Zhan   Delay-cost tradeoff for virtual machine
                                  migration in cloud data centers  . . . . 62--72
              Gulshan Kumar and   
            Mritunjay Kumar Rai   An energy efficient and optimized load
                                  balanced localization method using CDS
                                  with one-hop neighbourhood and genetic
                                  algorithm in WSNs  . . . . . . . . . . . 73--82
      Fábio D. Rossi and   
           Miguel G. Xavier and   
 César A. F. De Rose and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   E-eco: Performance-aware
                                  energy-efficient cloud data center
                                  orchestration  . . . . . . . . . . . . . 83--96
         Arani Bhattacharya and   
                    Pradipta De   A survey of adaptation techniques in
                                  computation offloading . . . . . . . . . 97--115
                 Cuiyu Kong and   
                  I.-Hsuan Peng   Tradeoff design of radio resource
                                  scheduling for power and spectrum
                                  utilizations in LTE uplink systems . . . 116--124
               Ying-Dar Lin and   
             Yuan-Cheng Lai and   
               Hung-Yi Teng and   
            Chun-Chieh Liao and   
                    Yi-Chih Kao   Scalable multicasting with multiple
                                  shared trees in software defined
                                  networking . . . . . . . . . . . . . . . 125--133
     Abdulbaghi Ghaderzadeh and   
              Mehdi Kargahi and   
                  Midia Reshadi   InFreD: Intelligent Free Rider Detection
                                  in collaborative distributed systems . . 134--145
Miguel López-Benítez and   
        Timothy D. Drysdale and   
             Simon Hadfield and   
        Mohamed Ismaeel Maricar   Prototype for multidisciplinary research
                                  in the context of the Internet of Things 146--161
                Weizhi Meng and   
                 Wenjuan Li and   
                 Yang Xiang and   
         Kim-Kwang Raymond Choo   A Bayesian inference-based detection
                                  mechanism to defend medical smartphone
                                  networks against insider attacks . . . . 162--169
           Md Akbar Hossain and   
            Nurul I. Sarkar and   
            Jairo Gutierrez and   
                    William Liu   Performance study of block ACK and
                                  reverse direction in IEEE 802.11n using
                                  a Markov chain model . . . . . . . . . . 170--179
                Sara Ayoubi and   
                 Chadi Assi and   
                Yiheng Chen and   
              Tarek Khalifa and   
           Khaled Bashir Shaban   Restoration methods for cloud multicast
                                  virtual networks . . . . . . . . . . . . 180--190
                Waqar Ahmed and   
                Osman Hasan and   
               Usman Pervez and   
                   Junaid Qadir   Reliability modeling and analysis of
                                  communication networks . . . . . . . . . 191--215
              Amrita Ghosal and   
               Subir Halder and   
                 Stefano Chessa   Secure key design approaches using
                                  entropy harvesting in wireless sensor
                                  network: a survey  . . . . . . . . . . . 216--230
           Mina Mirhosseini and   
             Fatemeh Barani and   
        Hossein Nezamabadi-pour   QQIGSA: a quadrivalent quantum-inspired
                                  GSA and its application in optimal
                                  adaptive design of wireless sensor
                                  networks . . . . . . . . . . . . . . . . 231--241
             Mukhtiar Ahmed and   
            Mazleena Salleh and   
              M. Ibrahim Channa   Routing protocols based on node mobility
                                  for Underwater Wireless Sensor Network
                                  (UWSN): a survey . . . . . . . . . . . . 242--252
                    Qing Li and   
                 Yong Jiang and   
               Pengfei Duan and   
                 Mingwei Xu and   
                        Xi Xiao   Quokka: Latency-Aware Middlebox
                                  Scheduling with dynamic resource
                                  allocation . . . . . . . . . . . . . . . 253--266
             Thaha Muhammed and   
              Riaz Ahmed Shaikh   An analysis of fault detection
                                  strategies in wireless sensor networks   267--287
                  Sheng Wen and   
             Jiaojiao Jiang and   
                     Bo Liu and   
                 Yang Xiang and   
                    Wanlei Zhou   Using epidemic betweenness to measure
                                  the influence of users in complex
                                  networks . . . . . . . . . . . . . . . . 288--299
             Chien-Fu Cheng and   
                    Lung-Hao Li   Data gathering problem with the data
                                  importance consideration in Underwater
                                  Wireless Sensor Networks . . . . . . . . 300--312
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 79, Number ??, February 1, 2017

   Muhammad Habib ur Rehman and   
              Chee Sun Liew and   
               Teh Ying Wah and   
          Muhammad Khurram Khan   Towards next-generation heterogeneous
                                  mobile data stream mining applications:
                                  Opportunities, challenges, and future
                                  research directions  . . . . . . . . . . 1--24
            Shahriar kaisar and   
        Joarder Kamruzzaman and   
              Gour Karmakar and   
                   Iqbal Gondal   Decentralized content sharing among
                                  tourists in visiting hotspots  . . . . . 25--40
   Kayode Sakariyah Adewole and   
           Nor Badrul Anuar and   
           Amirrudin Kamsin and   
      Kasturi Dewi Varathan and   
               Syed Abdul Razak   Malicious accounts: Dark of the social
                                  networks . . . . . . . . . . . . . . . . 41--67
         Annie Ibrahim Rana and   
               Brendan Jennings   Semantic aware processing of user
                                  defined inference rules to manage home
                                  networks . . . . . . . . . . . . . . . . 68--87
               Ashish Singh and   
              Kakali Chatterjee   Cloud security issues and challenges: a
                                  survey . . . . . . . . . . . . . . . . . 88--115
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 80, Number ??, February 15, 2017

                    Ting Lu and   
                 Guohua Liu and   
                     Wei Li and   
                 Shan Chang and   
                    Wenjing Guo   Distributed sampling rate allocation for
                                  data quality maximization in
                                  rechargeable sensor networks . . . . . . 1--9
         Prasan Kumar Sahoo and   
                 Jang-Ping Sheu   Design and analysis of collision free
                                  MAC for wireless sensor networks with or
                                  without data retransmission  . . . . . . 10--21
                 L. Manunza and   
               S. Marseglia and   
                   S. P. Romano   Kerberos: a real-time fraud detection
                                  system for IMS-enabled VoIP networks . . 22--34
               Chunhong Liu and   
             Chuanchang Liu and   
               Yanlei Shang and   
               Shiping Chen and   
                   Bo Cheng and   
                  Junliang Chen   An adaptive prediction approach based on
                                  workload pattern discrimination in the
                                  cloud  . . . . . . . . . . . . . . . . . 35--44
                   Fan Deng and   
                  Li-Yong Zhang   Elimination of policy conflict to
                                  improve the PDP evaluation performance   45--57
                   N. Busom and   
                 R. Petrlic and   
             F. Sebé and   
                   C. Sorge and   
                       M. Valls   A privacy-preserving reputation system
                                  with user rewards  . . . . . . . . . . . 58--66
            Habib Mostafaei and   
           Antonio Montieri and   
            Valerio Persico and   
         Antonio Pescapé   A sleep scheduling approach based on
                                  learning automata for WSN partial
                                  coverage . . . . . . . . . . . . . . . . 67--78
               Mohammad Masdari   Markov chain-based evaluation of the
                                  certificate status validations in hybrid
                                  MANETs . . . . . . . . . . . . . . . . . 79--89
                Jihong Wang and   
                    Wenxiao Shi   Joint multicast routing and channel
                                  assignment for multi-radio multi-channel
                                  wireless mesh networks with hybrid
                                  traffic  . . . . . . . . . . . . . . . . 90--108
             Maryam Barshan and   
              Hendrik Moens and   
            Bruno Volckaert and   
                 Filip De Turck   Design and evaluation of a dual dynamic
                                  adaptive reservation approach in media
                                  production networks  . . . . . . . . . . 109--122
          Maicon Melo Alves and   
                Luci Pirmez and   
           Silvana Rossetto and   
         Flavia C. Delicato and   
       Claudio M. de Farias and   
             Paulo F. Pires and   
         Igor L. dos Santos and   
               Albert Y. Zomaya   Damage prediction for wind turbines
                                  using wireless sensor and actuator
                                  networks . . . . . . . . . . . . . . . . 123--140
               Chengwen Luo and   
                 Long Cheng and   
                 Hande Hong and   
            Kartik Sankaran and   
             Mun Choon Chan and   
               Jianqiang Li and   
                     Zhong Ming   From mapping to indoor semantic queries:
                                  Enabling zero-effort indoor
                                  environmental sensing  . . . . . . . . . 141--151
              Ahmed AlEroud and   
                  Izzat Alsmadi   Identifying cyber-attacks on software
                                  defined networks: an inference-based
                                  intrusion detection approach . . . . . . 152--164
             Chao-Tung Yang and   
              Jung-Chun Liu and   
            Shuo-Tsung Chen and   
                Kuan-Lung Huang   Virtual machine management system based
                                  on the power saving algorithm in cloud   165--180
          Saritha Arunkumar and   
           Berker Soyluoglu and   
               Murat Sensoy and   
          Mudhakar Srivatsa and   
        Muttukrishnan Rajarajan   Location attestation and access control
                                  for mobile devices using GeoXACML  . . . 181--188
            Mehdi Boulaiche and   
   Louiza Bouallouche-Medjkoune   HSecGR: Highly Secure Geographic Routing 189--199
              Murat Karakus and   
                  Arjan Durresi   Quality of Service (QoS) in Software
                                  Defined Networking (SDN): a survey . . . 200--218
          Mohammad Goudarzi and   
              Mehran Zamani and   
     Abolfazl Toroghi Haghighat   A fast hybrid multi-site computation
                                  offloading for mobile cloud computing    219--231
         Alessandro Morelli and   
            Mauro Tortonesi and   
          Cesare Stefanelli and   
                  Niranjan Suri   Information-Centric Networking in
                                  next-generation communications scenarios 232--250
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 81, Number ??, March 1, 2017

               Marco Cogoni and   
          Giovanni Busonera and   
               Paolo Anedda and   
              Gianluigi Zanetti   Transition to congestion in
                                  communication/computation networks for
                                  near-optimal and sub-optimal resource
                                  management via Monte Carlo simulations   1--11
               Swati Sharma and   
            Alefiya Hussain and   
                    Huzur Saran   Towards repeatability & verifiability in
                                  networking experiments: a stochastic
                                  framework  . . . . . . . . . . . . . . . 12--23
               Asrin Vakili and   
         Nima Jafari Navimipour   Comprehensive and systematic review of
                                  the service composition mechanisms in
                                  the cloud environments . . . . . . . . . 24--36
                     Yu Xin and   
              Zhi-Qiang Xie and   
                      Jing Yang   A load balance oriented cost efficient
                                  scheduling method for parallel tasks . . 37--46
                   Shantanu Pal   Evaluating the impact of network loads
                                  and message size on mobile opportunistic
                                  networks in challenged environments  . . 47--58
          Giancarlo Fortino and   
          Giuseppe Di Fatta and   
            Sergio F. Ochoa and   
                Carlos E. Palau   Engineering future interoperable and
                                  open IoT systems . . . . . . . . . . . . 59--61
        Georgios Exarchakos and   
             Ilker Oztelcan and   
        Dimitris Sarakiotis and   
                 Antonio Liotta   plexi: Adaptive re-scheduling
                                  web-service of time synchronized
                                  low-power wireless networks  . . . . . . 62--73
                    G. Aloi and   
               G. Caliciuri and   
                 G. Fortino and   
                 R. Gravina and   
                    P. Pace and   
                   W. Russo and   
                    C. Savaglio   Enabling IoT interoperability through
                                  opportunistic smartphone-based mobile
                                  gateways . . . . . . . . . . . . . . . . 74--84
                  Pal Varga and   
          Fredrik Blomstedt and   
         Luis Lino Ferreira and   
              Jens Eliasson and   
             Mats Johansson and   
             Jerker Delsing and   
  Iker Martínez de Soria   Making system of systems interoperable
                                  --- The core components of the arrowhead
                                  framework  . . . . . . . . . . . . . . . 85--95
        Michael P. Andersen and   
                Gabe Fierro and   
                David E. Culler   Enabling synergy in IoT: Platform to
                                  service and beyond . . . . . . . . . . . 96--110
               Maria Ganzha and   
           Marcin Paprzycki and   
          Wieslaw Pawlowski and   
               Pawel Szmeja and   
          Katarzyna Wasielewska   Semantic interoperability in the
                                  Internet of Things: an overview from the
                                  INTER-IoT perspective  . . . . . . . . . 111--124
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 82, Number ??, March 15, 2017

          R. Asorey-Cacheda and   
       A.-J. Garcia-Sanchez and   
          F. Garcia-Sanchez and   
                 J. Garcia-Haro   A survey on non-linear optimization
                                  problems in wireless sensor networks . . 1--20
         Gianluca Franchino and   
               Giorgio Buttazzo   A power-aware MAC layer protocol for
                                  real-time communication in wireless
                                  embedded systems . . . . . . . . . . . . 21--34
                  Liang Zhu and   
               Changqiao Xu and   
              Jianfeng Guan and   
                   Hongke Zhang   SEM--PPA: a semantical pattern and
                                  preference-aware service mining method
                                  for personalized point of interest
                                  recommendation . . . . . . . . . . . . . 35--46
Juan J. Pérez-Solano and   
        Santiago Felici-Castell   Improving time synchronization in
                                  Wireless Sensor Networks using Bayesian
                                  Inference  . . . . . . . . . . . . . . . 47--55
               Wenting Shen and   
                     Jia Yu and   
                    Hui Xia and   
               Hanlin Zhang and   
                 Xiuqing Lu and   
                       Rong Hao   Light-weight and privacy-preserving
                                  secure cloud auditing scheme for group
                                  users via the third party medium . . . . 56--64
                  Alaa Awad and   
                Amr Mohamed and   
  Carla-Fabiana Chiasserini and   
                  Tarek Elfouly   Distributed in-network processing and
                                  resource optimization over mobile-health
                                  systems  . . . . . . . . . . . . . . . . 65--76
                Hyunbum Kim and   
                 Heekuck Oh and   
           Paolo Bellavista and   
               Jalel Ben-Othman   Constructing event-driven partial
                                  barriers with resilience in wireless
                                  mobile sensor networks . . . . . . . . . 77--92
               Maryam Amiri and   
          Leyli Mohammad-Khanli   Survey on prediction models of
                                  applications for resources provisioning
                                  in cloud . . . . . . . . . . . . . . . . 93--113
                 Furui Zhan and   
                Nianmin Yao and   
                Zhenguo Gao and   
                    Guozhen Tan   A novel key generation method for
                                  wireless sensor networks based on system
                                  of equations . . . . . . . . . . . . . . 114--127
                  Hang Shen and   
               Guangwei Bai and   
                   Mei Yang and   
                  Zhonghui Wang   Protecting trajectory privacy: a
                                  user-centric analysis  . . . . . . . . . 128--139
             Sanjib K. Deka and   
               Nityananda Sarma   Opportunity prediction at MAC-layer
                                  sensing for ad-hoc cognitive radio
                                  networks . . . . . . . . . . . . . . . . 140--151
          Hamid Reza Arkian and   
           Abolfazl Diyanat and   
              Atefe Pourkhalili   MIST: Fog-based data analytics scheme
                                  with cost-efficient resource
                                  provisioning for IoT crowdsensing
                                  applications . . . . . . . . . . . . . . 152--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 83, Number ??, April 1, 2017

   Amir Rahimzadeh Ilkhechi and   
          Ibrahim Korpeoglu and   
    Ugur Güdükbay and   
         Özgür Ulusoy   PETAL: a fully distributed location
                                  service for wireless ad hoc networks . . 1--11
                Mengmeng Ge and   
                Jin B. Hong and   
            Walter Guttmann and   
                 Dong Seong Kim   A framework for automating security
                                  analysis of the Internet of Things . . . 12--27
           Mariluz Congosto and   
          Pablo Basanta-Val and   
         Luis Sanchez-Fernandez   T-Hoarder: a framework to process
                                  Twitter data streams . . . . . . . . . . 28--39
       Palvinder Singh Mann and   
                   Satvir Singh   Energy efficient clustering protocol
                                  based on improved metaheuristic in
                                  wireless sensor networks . . . . . . . . 40--52
                 Chang Ruan and   
               Jianxin Wang and   
              Wanchun Jiang and   
               Jiawei Huang and   
                 Geyong Min and   
                         Yi Pan   FSQCN: Fast and simple quantized
                                  congestion notification in data center
                                  Ethernet . . . . . . . . . . . . . . . . 53--62
                    Yue Qiu and   
                   Maode Ma and   
                     Xilei Wang   A proxy signature-based handover
                                  authentication scheme for LTE wireless
                                  networks . . . . . . . . . . . . . . . . 63--71
               Nadine Abbas and   
                 Hazem Hajj and   
                 Zaher Dawy and   
                Karim Jahed and   
             Sanaa Sharafeddine   An optimized approach to video traffic
                                  splitting in heterogeneous wireless
                                  networks with energy and QoE
                                  considerations . . . . . . . . . . . . . 72--88
                  Jun Huang and   
                  Liqian Xu and   
                 Qiang Duan and   
             Cong-cong Xing and   
               Jiangtao Luo and   
                        Shui Yu   Modeling and performance analysis for
                                  multimedia data flows scheduling in
                                  software defined networks  . . . . . . . 89--100
              Jonghoon Park and   
              Cheoleun Moon and   
                 Ikjun Yeom and   
                     Yusung Kim   Cardinality estimation using collective
                                  interference for large-scale RFID
                                  systems  . . . . . . . . . . . . . . . . 101--110
            Samira Chouikhi and   
            In\`es El Korbi and   
      Yacine Ghamri-Doudane and   
            Leila Azouz Saidane   Centralized connectivity restoration in
                                  multichannel wireless sensor networks    111--123
                   Anum Ali and   
             Ghalib A. Shah and   
       Muhammad Omer Farooq and   
                    Usman Ghani   Technologies and challenges in
                                  developing machine-to-machine
                                  applications: a survey . . . . . . . . . 124--139
                   Ada Gogu and   
                Dritan Nace and   
           Enrico Natalizio and   
                 Yacine Challal   Using dynamic programming to solve the
                                  Wireless Sensor Network Configuration
                                  Problem  . . . . . . . . . . . . . . . . 140--154
        Adel Nadjaran Toosi and   
                 Chenhao Qu and   
Marcos Dias de Assunção and   
                 Rajkumar Buyya   Renewable-aware geographical load
                                  balancing of web applications for
                                  sustainable data centers . . . . . . . . 155--168
             Zina Chkirbene and   
               Sebti Foufou and   
               Ridha Hamila and   
                 Zahir Tari and   
               Albert Y. Zomaya   LaCoDa: Layered connected topology for
                                  massive data centers . . . . . . . . . . 169--180
         Abderrazak Abdaoui and   
          Tarek M. El Fouly and   
               Mohamed H. Ahmed   Impact of time synchronization error on
                                  the mode-shape identification and damage
                                  detection/localization in WSNs for
                                  structural health monitoring . . . . . . 181--189
       Israel Leyva-Mayorga and   
                 Vicent Pla and   
      Jorge Martinez-Bauset and   
        Mario E. Rivero-Angeles   A hybrid method for the QoS analysis and
                                  parameter optimization in time-critical
                                  random access wireless sensor networks   190--203
               Yunchuan Sun and   
                  Xinpei Yu and   
               Rongfang Bie and   
                   Houbing Song   Discovering time-dependent shortest path
                                  on traffic graph for drivers towards
                                  green driving  . . . . . . . . . . . . . 204--212
                     Yu Liu and   
             Changjie Zhang and   
                      Bo Li and   
                    Jianwei Niu   DeMS: a hybrid scheme of task scheduling
                                  and load balancing in computing clusters 213--220
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 84, Number ??, April 15, 2017

                 Neenu Garg and   
                     Seema Bawa   RITS--MHT: Relative indexed and time
                                  stamped Merkle hash tree based data
                                  auditing protocol for cloud computing    1--13
               Ingrid Nunes and   
        Frederico Schardong and   
        Alberto Schaeffer-Filho   BDI2DoS: an application using
                                  collaborating BDI agents to combat DDoS
                                  attacks  . . . . . . . . . . . . . . . . 14--24
Bruno Bogaz Zarpelão and   
      Rodrigo Sanches Miani and   
Cláudio Toshio Kawakani and   
     Sean Carlisto de Alvarenga   A survey of intrusion detection in
                                  Internet of Things . . . . . . . . . . . 25--37
      Muhammad Baqer Mollah and   
        Md. Abul Kalam Azad and   
           Athanasios Vasilakos   Security and privacy challenges in
                                  mobile cloud computing: Survey and way
                                  ahead  . . . . . . . . . . . . . . . . . 38--54
         Gürkan Solmaz and   
                   Damla Turgut   Tracking pedestrians and emergent events
                                  in disaster areas  . . . . . . . . . . . 55--67
            Mahfuzur Rahman and   
                   Peter Graham   Compatibility-based static VM placement
                                  minimizing interference  . . . . . . . . 68--81
       Babak Pourpeighambar and   
              Mehdi Dehghan and   
                  Masoud Sabaei   Multi-agent learning based routing for
                                  delay minimization in Cognitive Radio
                                  Networks . . . . . . . . . . . . . . . . 82--92
                Imad Jawhar and   
              Nader Mohamed and   
         Jameela Al-Jaroodi and   
          Dharma P. Agrawal and   
                    Sheng Zhang   Communication and networking of
                                  UAV-based systems: Classification and
                                  associated architectures . . . . . . . . 93--108
       Mohammed I. Alghamdi and   
               Xunfei Jiang and   
                   Ji Zhang and   
                 Jifu Zhang and   
              Minghua Jiang and   
                       Xiao Qin   Towards two-phase scheduling of
                                  real-time applications in distributed
                                  systems  . . . . . . . . . . . . . . . . 109--117
                Binglei Guo and   
                   Jiong Yu and   
                   Bin Liao and   
                Dexian Yang and   
                       Liang Lu   A green framework for DBMS based on
                                  energy-aware query optimization and
                                  energy-efficient query processing  . . . 118--130
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 85, Number ??, May 1, 2017

              Chun-Wei Tsai and   
             Priyanka Rawat and   
               Ming-Chao Chiang   Intelligent systems for heterogeneous
                                  networks . . . . . . . . . . . . . . . . 1--3
                 Heejun Roh and   
            Cheoulhoon Jung and   
               Kyunghwi Kim and   
              Sangheon Pack and   
                     Wonjun Lee   Joint flow and virtual machine placement
                                  in hybrid cloud data centers . . . . . . 4--13
             Bart Spinnewyn and   
               Ruben Mennes and   
         Juan Felipe Botero and   
            Steven Latré   Resilient application placement for
                                  geo-distributed cloud networks . . . . . 14--31
                S. Kirthica and   
              Rajeswari Sridhar   CIT: a Cloud Inter-operation Toolkit to
                                  enhance elasticity and tolerate shut
                                  down of external clouds  . . . . . . . . 32--46
                  Aiqin Hou and   
                Chase Q. Wu and   
                Dingyi Fang and   
             Yongqiang Wang and   
                      Meng Wang   Bandwidth scheduling for big data
                                  transfer using multiple fixed
                                  node-disjoint paths  . . . . . . . . . . 47--55
              Jianfeng Guan and   
                 Zhiwei Yan and   
                     Su Yao and   
               Changqiao Xu and   
                   Hongke Zhang   GBC-based caching function group
                                  selection algorithm for SINET  . . . . . 56--63
               Guangjie Han and   
               Chenyu Zhang and   
              Jinfang Jiang and   
                  Xuan Yang and   
                 Mohsen Guizani   Mobile anchor nodes path planning
                                  algorithms using network-density-based
                                  clustering in wireless sensor networks   64--75
               Junfeng Wang and   
                Yiming Miao and   
                  Ping Zhou and   
          M. Shamim Hossain and   
           Sk Md Mizanur Rahman   A software defined network routing in
                                  wireless multihop network  . . . . . . . 76--83
           Samir S. Soliman and   
                  Bongyong Song   Fifth generation (5G) cellular and the
                                  network for tomorrow: cognitive and
                                  cooperative approach for energy savings  84--93
              Vishal Sharma and   
      Kathiravan Srinivasan and   
             Han-Chieh Chao and   
               Kai-Lung Hua and   
                Wen-Huang Cheng   Intelligent deployment of UAVs in 5G
                                  heterogeneous communication environment
                                  for improved coverage  . . . . . . . . . 94--105
           Chih-Cheng Tseng and   
          Hwang--Cheng Wang and   
             Kuo-Chang Ting and   
            Chih-Chieh Wang and   
                 Fang-Chang Kuo   Fast game-based handoff mechanism with
                                  load balancing for LTE/LTE-A
                                  heterogeneous networks . . . . . . . . . 106--115
                  Chen Chen and   
                    Tie Qiu and   
                   Jinna Hu and   
                Zhiyuan Ren and   
                  Yang Zhou and   
            Arun Kumar Sangaiah   A congestion avoidance game for
                                  information exchange on intersections in
                                  heterogeneous vehicular networks . . . . 116--126
                  Haneul Ko and   
              Sangheon Pack and   
             Jong-Hyouk Lee and   
             Alexandru Petrescu   DLM: Delayed Location Management in
                                  network mobility (NEMO)-based public
                                  transportation systems . . . . . . . . . 127--133
               Hyun-Ho Choi and   
                  Jung-Ryun Lee   A flocking-inspired algorithm for fair
                                  resource allocation in vehicle-mounted
                                  mobile relays  . . . . . . . . . . . . . 134--142
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 86, Number ??, May 15, 2017

                  Zheng Yan and   
                    Jun Liu and   
               Laurence T. Yang   Special issue on pervasive social
                                  networking . . . . . . . . . . . . . . . 1--2
                  Chang Liu and   
               Liehuang Zhu and   
                    Jinjun Chen   Efficient searchable symmetric
                                  encryption for storing multiple source
                                  dynamic social data on cloud . . . . . . 3--14
                    Feng Lu and   
              Weikang Zhang and   
                 Liwen Shao and   
               Xunfei Jiang and   
                    Peng Xu and   
                        Hai Jin   Scalable influence maximization under
                                  independent cascade model  . . . . . . . 15--23
               Darren Quick and   
         Kim-Kwang Raymond Choo   Pervasive social networking forensics:
                                  Intelligence and evidence from mobile
                                  device extracts  . . . . . . . . . . . . 24--33
                   Gang Sun and   
                  Yuxia Xie and   
                   Dan Liao and   
                Hongfang Yu and   
                   Victor Chang   User-defined privacy location-sharing
                                  system in mobile online social networks  34--45
                  Zheng Yan and   
                   Wangyang Shi   CloudFile: a cloud data access control
                                  system based on mobile social trust  . . 46--58
                Wenyin Yang and   
                Guojun Wang and   
    Md Zakirul Alam Bhuiyan and   
         Kim-Kwang Raymond Choo   Hypergraph partitioning for social
                                  networks based on information entropy
                                  modularity . . . . . . . . . . . . . . . 59--71
                  Yue Zhang and   
                   Bin Song and   
                     Peng Zhang   Social behavior study under pervasive
                                  social networking based on decentralized
                                  deep reinforcement learning  . . . . . . 72--81
                Zufan Zhang and   
                 Lisha Wang and   
                    Dan Liu and   
                       Yu Zhang   Peer discovery for D2D communications
                                  based on social attribute and service
                                  attribute  . . . . . . . . . . . . . . . 82--91
                Yadong Zhou and   
               Beibei Zhang and   
               Xiaoxiao Sun and   
              Qinghua Zheng and   
                       Ting Liu   Analyzing and modeling dynamics of
                                  information diffusion in microblogging
                                  social network . . . . . . . . . . . . . 92--102
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 87, Number ??, June 1, 2017

           Mohammad Masdari and   
            Safiyyeh Ahmadzadeh   A survey and taxonomy of the
                                  authentication schemes in Telecare
                                  Medicine Information Systems . . . . . . 1--19
                 Bing Xiong and   
                   Kun Yang and   
               Jinyuan Zhao and   
                       Keqin Li   Robust dynamic network traffic
                                  partitioning against malicious attacks   20--31
    Franciscus X. A. Wibowo and   
            Mark A. Gregory and   
            Khandakar Ahmed and   
                Karina M. Gomez   Multi-domain Software Defined
                                  Networking: Research status and
                                  challenges . . . . . . . . . . . . . . . 32--45
                  Ping Song and   
                     Yi Liu and   
                    Chi Liu and   
                     Depei Qian   ParaFlow: Fine-grained parallel SDN
                                  controller for large-scale networks  . . 46--59
                 Sisi Xiong and   
                 Yanjun Yao and   
              Michael Berry and   
                 Hairong Qi and   
                       Qing Cao   Frequent traffic flow identification
                                  through probabilistic Bloom filter and
                                  its GPU-based acceleration . . . . . . . 60--72
         Rodolfo S. Antunes and   
         Matheus B. Lehmann and   
        Rodrigo B. Mansilha and   
         Luciano P. Gaspary and   
           Marinho P. Barcellos   NDNrel: a mechanism based on relations
                                  among objects to improve the performance
                                  of NDN . . . . . . . . . . . . . . . . . 73--86
             B. Ducourthial and   
                S. Mottelet and   
                      A. Busson   Improving fairness between close Wi-Fi
                                  access points  . . . . . . . . . . . . . 87--99
                 Chunlin Li and   
                 Jing Zhang and   
                    Youlong Luo   Real-time scheduling based on optimized
                                  topology and communication traffic in
                                  distributed real-time computation
                                  platform of storm  . . . . . . . . . . . 100--115
      Muhammad Faran Majeed and   
          Matthew N. Dailey and   
                  Riaz Khan and   
                  Apinun Tunpan   Pre-caching: a proactive scheme for
                                  caching video traffic in named data mesh
                                  networks . . . . . . . . . . . . . . . . 116--130
     Reza Farrahi Moghaddam and   
              Vahid Asghari and   
Fereydoun Farrahi Moghaddam and   
               Yves Lemieux and   
                Mohamed Cheriet   A Monte-Carlo approach to lifespan
                                  failure performance analysis of the
                                  network fabric in modular data centers   131--146
               Saeed Kargar and   
          Leyli Mohammad-Khanli   Fractal: an advanced multidimensional
                                  range query lookup protocol on nested
                                  rings for distributed systems  . . . . . 147--168
                Animesh Roy and   
                Soumit Bose and   
           Tamaghna Acharya and   
                   Sipra DasBit   Social-based energy-aware multicasting
                                  in delay tolerant networks . . . . . . . 169--184
                  W. Haider and   
                      J. Hu and   
                    J. Slay and   
             B. P. Turnbull and   
                         Y. Xie   Generating realistic intrusion detection
                                  system dataset based on fuzzy
                                  qualitative modeling . . . . . . . . . . 185--192
         David Nuñez and   
                Isaac Agudo and   
                   Javier Lopez   Proxy Re-Encryption: Analysis of
                                  constructions and its application to
                                  secure access delegation . . . . . . . . 193--209
                   Peng Liu and   
                    Biao Xu and   
                 Guojun Dai and   
                 Zhen Jiang and   
                         Jie Wu   MDP: Minimum delay hot-spot parking  . . 210--222
                 I. B. Arun and   
                T. G. Venkatesh   Design and performance analysis of a MAC
                                  protocol for wireless LANs supporting
                                  multipacket reception  . . . . . . . . . 223--236
           Mohammed Atiquzzaman   Editorial: New Editors 2017  . . . . . . A1--A5
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 88, Number ??, June 15, 2017

               De-gan Zhang and   
                     Si Liu and   
                 Ting Zhang and   
                     Zhao Liang   Novel unequal clustering routing
                                  protocol considering energy balancing
                                  based on network partition & distance for
                                  mobile education . . . . . . . . . . . . 1--9
      Fadele Ayotunde Alaba and   
             Mazliza Othman and   
Ibrahim Abaker Targio Hashem and   
                  Faiz Alotaibi   Internet of Things security: a survey    10--28
         Melchizedek Alipio and   
      Nestor Michael Tiglao and   
              Antonio Grilo and   
              Fawaz Bokhari and   
             Umair Chaudhry and   
                 Shavez Qureshi   Cache-based transport protocols in
                                  wireless sensor networks: a survey and
                                  future directions  . . . . . . . . . . . 29--49
  Einollah Jafarnejad Ghomi and   
        Amir Masoud Rahmani and   
         Nooruldeen Nasih Qader   Load-balancing algorithms in cloud
                                  computing: a survey  . . . . . . . . . . 50--71
             Ahmed I. Saleh and   
        Khaled M. Abo-Al-Ez and   
              Ahmed A. Abdullah   A Multi-Aware Query Driven (MAQD)
                                  routing protocol for mobile wireless
                                  sensor networks based on neuro-fuzzy
                                  inference  . . . . . . . . . . . . . . . 72--98
                Sumair Khan and   
                Babar Nazir and   
        Iftikhar Ahmed Khan and   
   Shahaboddin Shamshirband and   
        Anthony T. Chronopoulos   Load balancing in grid computing:
                                  Taxonomy, trends and opportunities . . . 99--111
                 Eunsam Kim and   
             Jonathan C. L. Liu   An integrated prefetching/caching scheme
                                  in multimedia servers  . . . . . . . . . 112--123
                 Ruiying Li and   
                  Meinan Li and   
                Haitao Liao and   
                     Ning Huang   An efficient method for evaluating the
                                  end-to-end transmission time reliability
                                  of a switched Ethernet . . . . . . . . . 124--133
               Carlos Abreu and   
          Francisco Miranda and   
                   P. M. Mendes   Smart context-aware QoS-based admission
                                  control for biomedical wireless sensor
                                  networks . . . . . . . . . . . . . . . . 134--145
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 89, Number ??, July 1, 2017

               Victor Chang and   
             Verena Kantere and   
             Muthu Ramanchadran   Emerging services for Internet of Things 1--2
                   Gang Sun and   
               Victor Chang and   
         Muthu Ramachandran and   
                  Zhili Sun and   
                 Gangmin Li and   
                Hongfang Yu and   
                       Dan Liao   Efficient location privacy algorithm for
                                  Internet of Things (IoT) services and
                                  applications . . . . . . . . . . . . . . 3--13
      Faisal Fayyaz Qureshi and   
                Rahat Iqbal and   
         Muhammad Nabeel Asghar   Energy efficient wireless communication
                                  technique based on Cognitive Radio for
                                  Internet of Things . . . . . . . . . . . 14--25
                  Yang Yang and   
             Xianghan Zheng and   
                  Chunming Tang   Lightweight distributed secure data
                                  management system for health Internet of
                                  Things . . . . . . . . . . . . . . . . . 26--37
        Muneer Bani Yassein and   
           Shadi Aljawarneh and   
                Esra'a Masa'deh   A new elastic trickle timer algorithm
                                  for Internet of Things . . . . . . . . . 38--47
                  Chen Chen and   
               Honghui Zhao and   
                    Tie Qiu and   
               Mingcheng Hu and   
                    Hui Han and   
                    Zhiyuan Ren   An efficient power saving polling scheme
                                  in the Internet of Energy  . . . . . . . 48--61
              Pradeep Kumar and   
             Rajkumar Saini and   
          Partha Pratim Roy and   
              Debi Prosad Dogra   A bio-signal based framework to secure
                                  mobile devices . . . . . . . . . . . . . 62--71
                     Fan Wu and   
                    Lili Xu and   
                Saru Kumari and   
                   Xiong Li and   
                  Jian Shen and   
     Kim-Kwang Raymond Choo and   
             Mohammad Wazid and   
                Ashok Kumar Das   An efficient authentication and key
                                  agreement scheme for multi-gateway
                                  wireless sensor networks in IoT
                                  deployment . . . . . . . . . . . . . . . 72--85
                 Cong Zhang and   
              Chin-Feng Lai and   
              Ying-Hsun Lai and   
                Zhen-Wei Wu and   
                 Han-Chieh Chao   An inferential real-time falling posture
                                  reconstruction for Internet of
                                  Healthcare Things  . . . . . . . . . . . 86--95
                 Thar Baker and   
              Muhammad Asim and   
              Hissam Tawfik and   
           Bandar Aldawsari and   
                 Rajkumar Buyya   An energy-aware service composition
                                  algorithm for multiple cloud-based IoT
                                  applications . . . . . . . . . . . . . . 96--108
             Md Fasiul Alam and   
          Serafeim Katsikas and   
           Olga Beltramello and   
       Stathes Hadjiefthymiades   Augmented and virtual reality based
                                  monitoring and safety system: a
                                  prototype IoT platform . . . . . . . . . 109--119
          Xuan Thang Nguyen and   
               Huu Tam Tran and   
               Harun Baraki and   
                     Kurt Geihs   Optimization of non-functional
                                  properties in Internet of Things
                                  applications . . . . . . . . . . . . . . 120--129
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 90, Number ??, July 15, 2017

    Cristian Cleder Machado and   
   Juliano Araujo Wickboldt and   
Lisandro Zambenedetti Granville and   
        Alberto Schaeffer-Filho   ARKHAM: an Advanced Refinement toolkit
                                  for Handling Service Level Agreements in
                                  Software-Defined Networking  . . . . . . 1--16
            Ahmad H. Dehwah and   
      Shahrazed Elmetennani and   
              Christian Claudel   UD-WCMA: an energy estimation and
                                  forecast scheme for solar powered
                                  wireless sensor networks . . . . . . . . 17--25
        Thiago P. B. Vieira and   
   Danilo F. Tenório and   
João Paulo C. L. da Costa and   
       Edison P. de Freitas and   
         Giovanni Del Galdo and   
Rafael T. de Sousa Júnior   Model order selection and eigen
                                  similarity based framework for detection
                                  and identification of network attacks    26--41
               Javad Zarrin and   
              Rui L. Aguiar and   
      João Paulo Barraca   HARD: Hybrid Adaptive Resource Discovery
                                  for Jungle Computing . . . . . . . . . . 42--73
              Ju Hyoung Mun and   
                    Hyesook Lim   Cache sharing using bloom filters in
                                  named data networking  . . . . . . . . . 74--82
                  Tin-Yu Wu and   
              Nadra Guizani and   
               Jhih-Siang Huang   Live migration improvements by related
                                  dirty memory prediction in cloud
                                  computing  . . . . . . . . . . . . . . . 83--89
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 91, Number ??, August 1, 2017

                  Erwin Adi and   
                Zubair Baig and   
                Philip Hingston   Stealthy Denial of Service (DoS) attack
                                  modelling and detection for HTTP/2
                                  services . . . . . . . . . . . . . . . . 1--13
              Trung V. Phan and   
            Nguyen Khac Bao and   
                     Minho Park   Distributed-SOM: a novel performance
                                  bottleneck handler for large-sized
                                  software-defined networks under flooding
                                  attacks  . . . . . . . . . . . . . . . . 14--25
                Shigen Shen and   
                 Haiping Ma and   
                     En Fan and   
                    Keli Hu and   
                    Shui Yu and   
                Jianhua Liu and   
                     Qiying Cao   A non-cooperative non-zero-sum
                                  game-based dependability assessment of
                                  heterogeneous WSNs with malware
                                  diffusion  . . . . . . . . . . . . . . . 26--35
           Mohammad Masdari and   
        Safiyyeh Ahmadzadeh and   
                  Moazam Bidaki   Key management in wireless Body Area
                                  Network: Challenges and issues . . . . . 36--51
            Vireshwar Kumar and   
      Jung-Min (Jerry) Park and   
                    Kaigui Bian   Transmitter authentication using
                                  hierarchical modulation in dynamic
                                  spectrum sharing . . . . . . . . . . . . 52--60
            Souad Ghazouani and   
                  Yahya Slimani   A survey on cloud service description    61--74
                 Jing Zhang and   
                      Li Xu and   
               Shuming Zhou and   
                 Geyong Min and   
                 Yang Xiang and   
                         Jia Hu   Crossed Cube Ring: a $k$-connected
                                  virtual backbone for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 75--88
      Malik Muhammad Qirtas and   
               Yasir Faheem and   
        Mubashir Husain Rehmani   Throwboxes in delay tolerant networks: a
                                  survey of placement strategies,
                                  buffering capacity, and mobility models  89--103
           Angelos Michalas and   
             Aggeliki Sgora and   
          Dimitrios D. Vergados   An integrated MIH-FPMIPv6 mobility
                                  management approach for evolved-packet
                                  system architectures . . . . . . . . . . 104--119
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 92, Number ??, August 15, 2017

             Sabu M. Thampi and   
         Jaime Lloret Mauri and   
                     Robin Doss   Special issue on Underwater Acoustic
                                  Sensor Networks: Emerging trends and
                                  current perspectives . . . . . . . . . . 1--2
          Sarang C. Dhongdi and   
              Pritish Nahar and   
        Rishabh Sethunathan and   
             Lucy J. Gudino and   
                  K. R. Anupama   Cross-layer protocol stack development
                                  for three-dimensional underwater
                                  Acoustic Sensor Network  . . . . . . . . 3--19
               Priyatosh Mandal   Performance comparison of TDMA variants
                                  for underwater acoustic sensor networks  20--30
              Nadeem Javaid and   
             Sheraz Hussain and   
               Ashfaq Ahmad and   
             Muhammad Imran and   
                  Abid Khan and   
                 Mohsen Guizani   Region based cooperative routing in
                                  underwater wireless sensor networks  . . 31--41
                Shalli Rani and   
          Syed Hassan Ahmed and   
          Jyoteesh Malhotra and   
                Rajneesh Talwar   Energy efficient chain based routing
                                  protocol for underwater wireless sensor
                                  networks . . . . . . . . . . . . . . . . 42--50
               Guangjie Han and   
                     Li Liu and   
                     Na Bao and   
              Jinfang Jiang and   
                Wenbo Zhang and   
        Joel J. P. C. Rodrigues   AREP: an asymmetric link-based reverse
                                  routing protocol for underwater acoustic
                                  sensor networks  . . . . . . . . . . . . 51--58
              Jingjing Wang and   
                    Wei Shi and   
                 Lingwei Xu and   
                  Liya Zhou and   
                  Qiuna Niu and   
                         Ju liu   Design of optical-acoustic hybrid
                                  underwater wireless sensor network . . . 59--67
                Weifeng Sun and   
                   Chi Zhou and   
                    Tie Qiu and   
                     Yuqing Liu   An efficient communication scheme for
                                  solving merge conflicts in maritime
                                  transportation . . . . . . . . . . . . . 68--76
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 93, Number ??, September 1, 2017

          Mustapha Boushaba and   
           Abdelhakim Hafid and   
                Michel Gendreau   Node stability-based routing in Wireless
                                  Mesh Networks  . . . . . . . . . . . . . 1--12
               Albert Sunny and   
         Sumankumar Panchal and   
             Nikhil Vidhani and   
     Subhashini Krishnasamy and   
             S. V. R. Anand and   
               Malati Hegde and   
                   Joy Kuri and   
                   Anurag Kumar   A generic controller for managing TCP
                                  transfers in IEEE 802.11 infrastructure
                                  WLANs  . . . . . . . . . . . . . . . . . 13--26
            Chi-Sheng Huang and   
             Meng-Feng Tsai and   
             Po-Hsuan Huang and   
                 Li-Ding Su and   
                 Kuei-Sheng Lee   Distributed asteroid discovery system
                                  for large astronomical data  . . . . . . 27--37
                Farid Lalem and   
          Ahc\`ene Bounceur and   
              Madani Bezoui and   
          Massinissa Saoudi and   
            Reinhardt Euler and   
              Tahar Kechadi and   
                    Marc Sevaux   LPCN: Least polar-angle connected node
                                  algorithm to find a polygon hull in a
                                  connected Euclidean graph  . . . . . . . 38--50
                   M. Ahmad and   
                    M. Azam and   
                   M. Naeem and   
                   M. Iqbal and   
               A. Anpalagan and   
                      M. Haneef   Resource management in D2D
                                  communication: an optimization
                                  perspective  . . . . . . . . . . . . . . 51--75
                 Chaofan Ma and   
                  Wei Liang and   
                     Meng Zheng   Delay constrained relay node placement
                                  in two-tiered wireless sensor networks:
                                  a set-covering-based algorithm . . . . . 76--90
               Jeyasekar A. and   
          Kasmir Raja S. V. and   
                 Annie Uthra R.   Congestion avoidance algorithm using
                                  ARIMA(2,1,1) model-based RTT estimation
                                  and RSS in heterogeneous wired-wireless
                                  networks . . . . . . . . . . . . . . . . 91--109
              Chengming Luo and   
                     Wei Li and   
                 Xinnan Fan and   
                   Hai Yang and   
                 Jianjun Ni and   
                Xuewu Zhang and   
                Gaifang Xin and   
                    Pengfei Shi   Positioning technology of mobile vehicle
                                  using self-repairing heterogeneous
                                  sensor networks  . . . . . . . . . . . . 110--122
                    Chao Bu and   
               Xingwei Wang and   
                  Hui Cheng and   
                  Min Huang and   
                   Keqin Li and   
                   Sajal K. Das   Enabling Adaptive Routing Service
                                  Customization via the integration of SDN
                                  and NFV  . . . . . . . . . . . . . . . . 123--136
                   Sugi Lee and   
              Younghoon Kim and   
                 Ikjun Yeom and   
                     Yusung Kim   Active request management in stateful
                                  forwarding networks  . . . . . . . . . . 137--149
            Mohammad Sharif and   
     Abolghasem Sadeghi-Niaraki   Ubiquitous sensor network simulation and
                                  emulation environments: a survey . . . . 150--181
        Pieter-Jan Maenhaut and   
              Hendrik Moens and   
            Bruno Volckaert and   
             Veerle Ongenae and   
                 Filip De Turck   A dynamic Tenant-Defined Storage system
                                  for efficient resource management in
                                  cloud applications . . . . . . . . . . . 182--196
                      Bo Yi and   
               Xingwei Wang and   
                      Min Huang   Design and evaluation of schemes for
                                  provisioning service function chain with
                                  function scalability . . . . . . . . . . 197--214
              Yao-Chung Fan and   
                  Huan Chen and   
               Fang-Yie Leu and   
                      Ilsun You   Enabling in-network aggregation by
                                  diffusion units for urban scale M2M
                                  networks . . . . . . . . . . . . . . . . 215--227
             Akiya Kamimura and   
                   Kohji Tomita   A self-organizing network coordination
                                  framework enabling collision-free and
                                  congestion-less wireless sensor networks 228--244
         Muhammad Asif Khan and   
                Wael Cherif and   
               Fethi Filali and   
                   Ridha Hamila   Wi-Fi Direct Research --- Current Status
                                  and Future Perspectives  . . . . . . . . 245--258
               Shahid Anwar and   
              Zakira Inayat and   
     Mohamad Fadli Zolkipli and   
         Jasni Mohamad Zain and   
              Abdullah Gani and   
           Nor Badrul Anuar and   
      Muhammad Khurram Khan and   
                   Victor Chang   Cross-VM cache-based side channel
                                  attacks and proposed prevention
                                  mechanisms: a survey . . . . . . . . . . 259--279
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 94, Number ??, September 15, 2017

               Reza Ghebleh and   
                   Ali Ghaffari   Retracted: A Comprehensive survey on 5G:
                                  the prospect of future communications    1--32
                    Bin Dai and   
                    Guan Xu and   
            Bengxiong Huang and   
                   Peng Qin and   
                        Yang Xu   Enabling network innovation in data
                                  center networks with software defined
                                  networking: a survey . . . . . . . . . . 33--49
               Faheem Zafar and   
                  Abid Khan and   
                Saba Suhail and   
               Idrees Ahmed and   
              Khizar Hameed and   
        Hayat Mohammad Khan and   
             Farhana Jabeen and   
                    Adeel Anjum   Trustworthy data: a survey, taxonomy and
                                  future trends of secure provenance
                                  schemes  . . . . . . . . . . . . . . . . 50--68
                Arijit Nath and   
               Nityananda Sarma   A distributed solution for cooperative
                                  spectrum sensing scheduling in
                                  multi-band cognitive radio networks  . . 69--77
         Stefano Petrangeli and   
                 Tingyao Wu and   
                Tim Wauters and   
           Rafael Huysegems and   
                Tom Bostoen and   
                 Filip De Turck   A machine learning-based framework for
                                  preventing video freezes in HTTP
                                  adaptive streaming . . . . . . . . . . . 78--92
              Warley Junior and   
      Adriano França and   
                Kelvin Dias and   
        José N. de Souza   Supporting mobility-aware computational
                                  offloading in mobile cloud environment   93--108
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 95, Number ??, October 1, 2017

                Waqas Rehan and   
             Stefan Fischer and   
                 Maaz Rehan and   
        Mubashir Husain Rehmani   A comprehensive survey on multichannel
                                  routing in wireless sensor networks  . . 1--25
  Mohammad Sadegh Aslanpour and   
      Mostafa Ghobaei-Arani and   
            Adel Nadjaran Toosi   Auto-scaling web applications in clouds:
                                  a cost-aware approach  . . . . . . . . . 26--41
            Antonio Marotta and   
                Enrica Zola and   
     Fabio D'Andreagiovanni and   
                Andreas Kassler   A fast robust optimization-based
                                  heuristic for the deployment of green
                                  virtual network functions  . . . . . . . 42--53
              Garima Chopra and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   A survey on ultra-dense network and
                                  emerging technologies: Security
                                  challenges and possible solutions  . . . 54--78
             Leonard Heilig and   
             Rajkumar Buyya and   
               Stefan Voß   Location-aware brokering for consumers
                                  in multi-cloud computing environments    79--93
            Daniel Yokoyama and   
              Bruno Schulze and   
              Henrique Kloh and   
            Matheus Bandini and   
                  Vinod Rebello   Affinity aware scheduling model of
                                  cluster nodes in private clouds  . . . . 94--104
                Tingwei Zhu and   
                   Dan Feng and   
                  Fang Wang and   
                     Yu Hua and   
                 Qingyu Shi and   
                 Yanwen Xie and   
                       Yong Wan   A congestion-aware and robust multicast
                                  protocol in SDN-based data center
                                  networks . . . . . . . . . . . . . . . . 105--117
           Mohammed Atiquzzaman   Editorial: 2016 Best Paper Awards  . . . A1--A4
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 96, Number ??, October 15, 2017

              Chih-Min Chao and   
              Yun-Ting Ling and   
               Cheng-Hong Jiang   Number of channels adjustment for
                                  cognitive radio networks . . . . . . . . 1--13
            M. De Benedetti and   
                  F. D'Urso and   
                 G. Fortino and   
                 F. Messina and   
              G. Pappalardo and   
                     C. Santoro   A fault-tolerant self-organizing
                                  flocking approach for UAV aerial survey  14--30
Amir Khorsandi Koohanestani and   
       Amin Ghalami Osgouei and   
              Hossein Saidi and   
                     Ali Fanian   An analytical model for delay bound of
                                  OpenFlow based SDN using network
                                  calculus . . . . . . . . . . . . . . . . 31--38
             Pimmy Gandotra and   
               Rakesh Kumar Jha   A survey on green communication and
                                  security challenges in 5G wireless
                                  communication networks . . . . . . . . . 39--61
           Abolfazl Diyanat and   
             Ahmad Khonsari and   
                 Hosein Shafiei   Preservation of temporal privacy in body
                                  sensor networks  . . . . . . . . . . . . 62--71
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 97, Number ??, November 1, 2017

              Abdusy Syarif and   
       Abdelhafid Abouaissa and   
                  Pascal Lorenz   Operator calculus approach for route
                                  optimizing and enhancing wireless sensor
                                  network  . . . . . . . . . . . . . . . . 1--10
        Jorge Maestre Vidal and   
 Ana Lucila Sandoval Orozco and   
Luis Javier García Villalba   Alert correlation framework for malware
                                  detection by anomaly-based packet
                                  payload analysis . . . . . . . . . . . . 11--22
        Behrouz Pourghebleh and   
         Nima Jafari Navimipour   Data aggregation mechanisms in the
                                  Internet of things: a systematic review
                                  of the literature and recommendations
                                  for future research  . . . . . . . . . . 23--34
           Rekha Nachiappan and   
              Bahman Javadi and   
       Rodrigo N. Calheiros and   
               Kenan M. Matawie   Cloud storage reliability for Big Data
                                  applications: a state of the art survey  35--47
                Mussab Alaa and   
               A. A. Zaidan and   
               B. B. Zaidan and   
             Mohammed Talal and   
                  M. L. M. Kiah   A review of smart home applications
                                  based on Internet of Things  . . . . . . 48--65
               Suleman Khan and   
            Muhammad Shiraz and   
            Laleh Boroumand and   
              Abdullah Gani and   
          Muhammad Khurram Khan   Towards port-knocking authentication
                                  methods for mobile cloud computing . . . 66--78
              Vishal Sharma and   
                   Fei Song and   
                  Ilsun You and   
           Mohammed Atiquzzaman   Energy efficient device discovery for
                                  reliable communication in 5G-based IoT
                                  and BSNs using unmanned aerial vehicles  79--95
           Diego V. Queiroz and   
         Marcelo S. Alencar and   
              Ruan D. Gomes and   
        Iguatemi E. Fonseca and   
          Cesar Benavente-Peces   Survey and systematic mapping of
                                  industrial Wireless Sensor Networks  . . 96--125
               Satish Kumar and   
               Arnab Sarkar and   
                     Arijit Sur   A resource allocation framework for
                                  adaptive video streaming over LTE  . . . 126--139
         Stephen S. Oyewobi and   
              Gerhard P. Hancke   A survey of cognitive radio handoff
                                  schemes, challenges and issues for
                                  industrial wireless sensor networks
                                  (CR-IWSN)  . . . . . . . . . . . . . . . 140--156
           Shaufikah Shukri and   
      Latifah Munirah Kamarudin   Device free localization technology for
                                  human detection and counting with RF
                                  sensor networks: a review  . . . . . . . 157--174
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 98, Number ??, November 15, 2017

                Chaoyue Niu and   
               Minping Zhou and   
              Zhenzhe Zheng and   
                     Fan Wu and   
                    Guihai Chen   ERA: Towards privacy preservation and
                                  verifiability for online ad exchanges    1--10
          Hassan Jamil Syed and   
              Abdullah Gani and   
           Raja Wasim Ahmad and   
      Muhammad Khurram Khan and   
Abdelmuttlib Ibrahim Abdalla Ahmed   Cloud monitoring: a review, taxonomy,
                                  and open research issues . . . . . . . . 11--26
                 Pengfei Hu and   
            Sahraoui Dhelim and   
             Huansheng Ning and   
                        Tie Qiu   Survey on fog computing: architecture,
                                  key technologies, applications and open
                                  issues . . . . . . . . . . . . . . . . . 27--42
              Avnish Thakur and   
             Major Singh Goraya   A taxonomic survey on load balancing in
                                  cloud  . . . . . . . . . . . . . . . . . 43--57
             Hussein Khayou and   
                   Bakr Sarakbi   A validation model for non-lexical
                                  routing protocols  . . . . . . . . . . . 58--64
         Md Hasanul Ferdaus and   
             Manzur Murshed and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   An algorithm for network and data-aware
                                  placement of multi-tier applications in
                                  cloud data centers . . . . . . . . . . . 65--83
              Zakaria Gheid and   
             Yacine Challal and   
                     Xun Yi and   
             Abdelouahid Derhab   Efficient and privacy-aware multi-party
                                  classification protocol for human
                                  activity recognition . . . . . . . . . . 84--96
          Tarun Kulshrestha and   
               Divya Saxena and   
             Rajdeep Niyogi and   
        Vaskar Raychoudhury and   
                    Manoj Misra   SmartITS: Smartphone-based
                                  identification and tracking using
                                  seamless indoor-outdoor localization . . 97--113
              Surajit Basak and   
               Tamaghna Acharya   Cross layer optimization for outage
                                  minimizing routing in cognitive radio ad
                                  hoc networks with primary users' outage
                                  protection . . . . . . . . . . . . . . . 114--124
                Peiyan Yuan and   
              Mingyang Song and   
                   Xiaoyan Zhao   Effective and efficient collection of
                                  control messages for opportunistic
                                  routing algorithms . . . . . . . . . . . 125--130
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 99, Number ??, December 1, 2017

                YiPeng Wang and   
               Xiaochun Yun and   
            Yongzheng Zhang and   
                 Liwei Chen and   
                    Guangjun Wu   A nonparametric approach to the
                                  automated protocol fingerprint inference 1--9
              Gulshan Kumar and   
        Mritunjay Kumar Rai and   
                     Rahul Saha   Securing range free localization against
                                  wormhole attack using distance
                                  estimation and maximum likelihood
                                  estimation in Wireless Sensor Networks   10--16
         Luis Miguel Torres and   
      Eduardo Magaña and   
       Daniel Morató and   
    Santiago Garcia-Jimenez and   
                     Mikel Izal   TBDClust: Time-based density clustering
                                  to enable free browsing of sites in
                                  pay-per-use mobile Internet providers    17--27
                    Ying Qu and   
                   Bryan Ng and   
                  Michael Homer   A goodput distribution model for
                                  planning IEEE 802.11 WBNs in built
                                  environments . . . . . . . . . . . . . . 28--46
             Seokseong Jeon and   
              Jae-Pil Jeong and   
              Young-Joo Suh and   
                  Chansu Yu and   
                    Dongsoo Han   Selective AP probing for indoor
                                  positioning in a large and AP-dense
                                  environment  . . . . . . . . . . . . . . 47--57
Adrián Sánchez-Carmona and   
             Carlos Borrego and   
               Sergi Robles and   
 Gerard Garcia-Vandellós   Two birds, one stone: Using mobility
                                  behavioral profiles both as destinations
                                  and as a routing tool  . . . . . . . . . 58--72
           Fatima Tul Zuhra and   
    Kamalrulnizam Abu Bakar and   
                Adnan Ahmed and   
               Mohsin Ali Tunio   Routing protocols in wireless body
                                  sensor networks: a comprehensive survey  73--97
       Sarogini Grace Pease and   
             Paul P. Conway and   
                 Andrew A. West   Hybrid ToF and RSSI real-time semantic
                                  tracking with an adaptive industrial
                                  Internet of Things architecture  . . . . 98--109
                     Yu Xin and   
                 Ya-Di Wang and   
              Zhi-Qiang Xie and   
                      Jing Yang   A cooperative scheduling method based on
                                  the device load feedback for multiple
                                  tasks scheduling . . . . . . . . . . . . 110--119
   M. C. Lucas-Estañ and   
                    J. Gozalvez   Distributed radio resource allocation
                                  for device-to-device communications
                                  underlaying cellular networks  . . . . . 120--130
                    Indu I. and   
         Rubesh Anand P. M. and   
           Vidhyacharan Bhaskar   Encrypted token based authentication
                                  with adapted SAML technology for cloud
                                  web services . . . . . . . . . . . . . . 131--145
            Giulio Aliberti and   
          Roberto Di Pietro and   
                Stefano Guarino   Epidemic data survivability in
                                  Unattended Wireless Sensor Networks: New
                                  models and results . . . . . . . . . . . 146--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 100, Number ??, December 15, 2017

           Mohammed Atiquzzaman   100 Volumes of JNCA  . . . . . . . . . . iii--iv
                  Cong Wang and   
                   Maode Ma and   
                   Zenghua Zhao   Design of a novel dynamic trust model
                                  for spectrum management in WRANs of TV
                                  white space  . . . . . . . . . . . . . . 1--10
     A. B. M. Alim Al Islam and   
         Tusher Chakraborty and   
         Taslim Arefin Khan and   
              Mahabub Zoraf and   
         Chowdhury Sayeed Hyder   Towards defending eavesdropping on NFC   11--23
           Tassos Dimitriou and   
              Ioannis Krontiris   Privacy-respecting auctions and
                                  rewarding mechanisms in mobile
                                  crowd-sensing applications . . . . . . . 24--34
                    Sandhya and   
                 Yash Sinha and   
                    K. Haribabu   A survey: Hybrid SDN . . . . . . . . . . 35--55
  Iria Estévez-Ayres and   
 Jesús Arias Fisteus and   
           Carlos Delgado-Kloos   Lostrego: a distributed stream-based
                                  infrastructure for the real-time
                                  gathering and analysis of heterogeneous
                                  educational data . . . . . . . . . . . . 56--68
            Mohammed Hashem and   
          Shrief I. Barakat and   
            Mahmoud A. AttaAlla   Enhanced tree routing protocols for
                                  multi-hop and multi-channel cognitive
                                  radio network (EMM--TRP) . . . . . . . . 69--79
                Sidra Aslam and   
              Saif ul Islam and   
                  Abid Khan and   
              Mansoor Ahmed and   
           Adnan Akhundzada and   
          Muhammad Khurram Khan   Information collection centric
                                  techniques for cloud resource
                                  management: Taxonomy, analysis and
                                  challenges . . . . . . . . . . . . . . . 80--94
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 101, Number ??, January 1, 2018

                      Anonymous   Thank You Reviewers  . . . . . . . . . . iii--ix
  Nanda Kumar Thanigaivelan and   
          Ethiopia Nigussie and   
              Antti Hakkala and   
             Seppo Virtanen and   
                   Jouni Isoaho   CoDRA: Context-based dynamically
                                  reconfigurable access control system for
                                  Android  . . . . . . . . . . . . . . . . 1--17
               Faheem Ullah and   
            Matthew Edwards and   
             Rajiv Ramdhany and   
          Ruzanna Chitchyan and   
               M. Ali Babar and   
                   Awais Rashid   Data exfiltration: a review of external
                                  attack vectors and countermeasures . . . 18--54
       Mohamed Amine Ferrag and   
          Leandros Maglaras and   
          Antonios Argyriou and   
         Dimitrios Kosmanos and   
                  Helge Janicke   Security for 4G and 5G cellular
                                  networks: a survey of existing
                                  authentication and privacy-preserving
                                  schemes  . . . . . . . . . . . . . . . . 55--82
                   Yao Shen and   
                   Wei Yang and   
                 Liusheng Huang   Concealed in web surfing: Behavior-based
                                  covert channels in HTTP  . . . . . . . . 83--95
              Philip Parsch and   
               Alejandro Masrur   On reliable communication in
                                  transmit-only networks for home
                                  automation . . . . . . . . . . . . . . . 96--110
                   Lei Wang and   
                Jianwei Niu and   
               Houbing Song and   
           Mohammed Atiquzzaman   SentiRelated: a cross-domain sentiment
                                  classification algorithm for short texts
                                  through sentiment related index  . . . . 111--119
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 102, Number ??, January 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                    Jin Cao and   
                   Maode Ma and   
                     Hui Li and   
                  Yulong Fu and   
                    Xuefeng Liu   EGHR: Efficient group-based handover
                                  authentication protocols for mMTC in 5G
                                  wireless networks  . . . . . . . . . . . 1--16
                 Kumar Ravi and   
          Yogesh Khandelwal and   
        Boora Shiva Krishna and   
                 Vadlamani Ravi   Analytics in/for cloud --- an
                                  interdependence: a review  . . . . . . . 17--37
              Vishal Sharma and   
                  Ilsun You and   
               Fang-Yie Leu and   
           Mohammed Atiquzzaman   Secure and efficient protocol for fast
                                  handover in 5G mobile Xhaul networks . . 38--57
             Naina Emmanuel and   
                  Abid Khan and   
                Masoom Alam and   
               Tanveer Khan and   
          Muhammad Khurram Khan   Structures and data preserving
                                  homomorphic signatures . . . . . . . . . 58--70
                  Usama Mir and   
           Zeeshan Ahmed Bhatti   Time triggered handoff schemes in
                                  cognitive radio networks: a survey . . . 71--85


Journal of Network and Computer Applications
Volume 103, Number ??, February 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . i--i
Marcos Dias de Assunção and   
   Alexandre da Silva Veith and   
                 Rajkumar Buyya   Distributed data stream processing and
                                  edge computing: a survey on resource
                                  elasticity and future directions . . . . 1--17
                 Furui Zhan and   
                Nianmin Yao and   
                Zhenguo Gao and   
                      Haitao Yu   Efficient key generation leveraging
                                  wireless channel reciprocity for MANETs  18--28
                Haneet Kour and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   A comprehensive survey on spectrum
                                  sharing: Architecture, energy efficiency
                                  and security issues  . . . . . . . . . . 29--57
                Sadip Midya and   
                 Asmita Roy and   
           Koushik Majumder and   
               Santanu Phadikar   Multi-objective optimization technique
                                  for resource allocation and task
                                  scheduling in vehicular cloud
                                  architecture: a hybrid adaptive nature
                                  inspired approach  . . . . . . . . . . . 58--84
    Veerabhadra Rao Chandakanna   REHDFS: a random read/write enhanced
                                  HDFS . . . . . . . . . . . . . . . . . . 85--100
                 Yuan Zhang and   
                    Lin Cui and   
                   Wei Wang and   
                  Yuxiang Zhang   A survey on software defined networking
                                  with multiple controllers  . . . . . . . 101--118
               Laizhong Cui and   
               Huaixiong Hu and   
                    Shui Yu and   
                   Qiao Yan and   
                 Zhong Ming and   
                Zhenkun Wen and   
                         Nan Lu   DDSE: a novel evolutionary algorithm
                                  based on degree-descending search
                                  strategy for influence maximization in
                                  social networks  . . . . . . . . . . . . 119--130
             Giuseppe Aceto and   
           Domenico Ciuonzo and   
           Antonio Montieri and   
         Antonio Pescapé   Multi-classification approaches for
                                  classifying mobile app traffic . . . . . 131--145
                  Yan Huang and   
                Zhipeng Cai and   
               Anu G. Bourgeois   Search locations safely and accurately:
                                  a location privacy protection algorithm
                                  with accurate service  . . . . . . . . . 146--156
              Sameh Zakhary and   
          Abderrahim Benslimane   On location-privacy in opportunistic
                                  mobile networks, a survey  . . . . . . . 157--170
                Jungang Lou and   
             Yunliang Jiang and   
                  Qing Shen and   
                    Ruiqin Wang   Failure prediction by relevance vector
                                  regression with improved
                                  quantum-inspired gravitational search    171--177
                    Lu Zhou and   
              Quanlong Wang and   
                    Xin Sun and   
              Piotr Kulicki and   
          Arcangelo Castiglione   Quantum technique for access control in
                                  cloud computing II: Encryption and key
                                  distribution . . . . . . . . . . . . . . 178--184
             Changsong Yang and   
              Xiaofeng Chen and   
                     Yang Xiang   Blockchain-based publicly verifiable
                                  data deletion scheme for cloud storage   185--193
                   Xiong Li and   
                Jianwei Niu and   
                Saru Kumari and   
                     Fan Wu and   
        Arun Kumar Sangaiah and   
         Kim-Kwang Raymond Choo   A three-factor anonymous authentication
                                  scheme for wireless sensor networks in
                                  Internet of Things environments  . . . . 194--204
               Guangjie Han and   
                 Wenhui Que and   
               Gangyong Jia and   
                    Wenbo Zhang   Resource-utilization-aware energy
                                  efficient server consolidation algorithm
                                  for green computing in IIOT  . . . . . . 205--214
                Qinying Lin and   
               Houbing Song and   
                Xiaolin Gui and   
              Xiaoping Wang and   
                       Saiyu Su   A shortest path routing algorithm for
                                  unmanned aerial systems based on grid
                                  position . . . . . . . . . . . . . . . . 215--224
                    Bin Cao and   
               Jianwei Zhao and   
                  Zhihan Lv and   
                    Xin Liu and   
               Xinyuan Kang and   
                      Shan Yang   Deployment optimization for $3$D
                                  industrial wireless sensor networks
                                  based on particle swarm optimizers with
                                  distributed parallelism  . . . . . . . . 225--238
              Weishan Zhang and   
                Gaowa Wulan and   
                   Jia Zhai and   
                   Liang Xu and   
                 Dehai Zhao and   
                    Xin Liu and   
                    Su Yang and   
                    Jiehan Zhou   An intelligent power distribution
                                  service architecture using cloud
                                  computing and deep learning techniques   239--248
              Muzzamil Noor and   
               Haider Abbas and   
              Waleed Bin Shahid   Countering cyber threats for industrial
                                  applications: an automated approach for
                                  malware evasion detection and analysis   249--261
                   Keke Gai and   
                Meikang Qiu and   
                   Xiaotong Sun   A survey on FinTech  . . . . . . . . . . 262--273
                  Deze Zeng and   
               Shiyan Zhang and   
                     Lin Gu and   
                    Shui Yu and   
                    Zhangjie Fu   Quality-of-sensing aware budget
                                  constrained contaminant detection sensor
                                  deployment in water distribution system  274--279


Journal of Network and Computer Applications
Volume 104, Number ??, February 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Amrita Bose Paul and   
             Santosh Biswas and   
              Sukumar Nandi and   
             Sandip Chakraborty   MATEM: A unified framework based on
                                  trust and MCDM for assuring security,
                                  reliability and QoS in DTN routing . . . 1--20
               Mahdi Zareei and   
   A. K. M. Muzahidul Islam and   
       Cesar Vargas-Rosales and   
             Nafees Mansoor and   
          Shidrokh Goudarzi and   
        Mubashir Husain Rehmani   Mobility-aware medium access control
                                  protocols for wireless sensor networks:
                                  A survey . . . . . . . . . . . . . . . . 21--37
                    Shuo Yu and   
                Jiaying Liu and   
                  Zhuo Yang and   
                  Zhen Chen and   
              Huizhen Jiang and   
                  Amr Tolba and   
                       Feng Xia   PAVE: Personalized Academic Venue
                                  recommendation Exploiting co-publication
                                  networks . . . . . . . . . . . . . . . . 38--47
        Jai Sukh Paul Singh and   
            Mritunjay Kumar Rai   CROP: Cognitive radio ROuting Protocol
                                  for link quality channel diverse
                                  cognitive networks . . . . . . . . . . . 48--60
             Zainab AlSaeed and   
               Imtiaz Ahmad and   
               Iftekhar Hussain   Multicasting in software defined
                                  networks: A comprehensive survey . . . . 61--77
                Wenjie Ruan and   
              Quan Z. Sheng and   
                   Lina Yao and   
                     Xue Li and   
     Nickolas J. G. Falkner and   
                       Lei Yang   Device-free human localization and
                                  tracking with UHF passive RFID tags: A
                                  data-driven approach . . . . . . . . . . 78--96
                   Anmin Fu and   
                   Yuhan Li and   
                    Shui Yu and   
                     Yan Yu and   
                 Gongxuan Zhang   DIPOR: An IDA-based dynamic proof of
                                  retrievability scheme for cloud storage
                                  systems  . . . . . . . . . . . . . . . . 97--106
   Alejandro Cánovas and   
                 Miran Taha and   
               Jaime Lloret and   
      Jesús Tomás   Smart resource allocation for improving
                                  QoE in IP Multimedia Subsystems  . . . . 107--116
           Zeinab Rezaeifar and   
                  Jian Wang and   
                     Heekuck Oh   A trust-based method for mitigating
                                  cache poisoning in Name Data Networking  117--132
                 Ruhul Amin and   
        S. K. Hafizul Islam and   
               Neeraj Kumar and   
         Kim-Kwang Raymond Choo   An untraceable and anonymous password
                                  authentication protocol for
                                  heterogeneous wireless sensor networks   133--144


Journal of Network and Computer Applications
Volume 105, Number ??, March 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Mahmoud Bahnasy and   
             Halima Elbiaze and   
               Bochra Boughzala   Zero-queue Ethernet congestion control
                                  protocol based on available bandwidth
                                  estimation . . . . . . . . . . . . . . . 1--20
               Maryam Amiri and   
      Leyli Mohammad-Khanli and   
             Raffaela Mirandola   A sequential pattern mining model for
                                  application workload prediction in cloud
                                  environment  . . . . . . . . . . . . . . 21--62
                 Ivan Vidal and   
       Jaime Garcia-Reinoso and   
               Ignacio Soto and   
           Francisco Valera and   
                    Diego Lopez   SCoT: A secure content-oriented
                                  transport  . . . . . . . . . . . . . . . 63--78
  Naresh Kumar Reddy Beechu and   
Vasantha Moodabettu Harishchandra and   
Nithin Kumar Yernad Balachandra   An energy-efficient fault-aware core
                                  mapping in mesh-based network on chip
                                  systems  . . . . . . . . . . . . . . . . 79--87
               Jorge Blasco and   
             Thomas M. Chen and   
                Igor Muttik and   
              Markus Roggenbach   Detection of app collusion potential
                                  using logic programming  . . . . . . . . 88--104
                    Gao Liu and   
                  Zheng Yan and   
                 Witold Pedrycz   Data collection for attack detection and
                                  security measurement in Mobile Ad Hoc
                                  Networks: A survey . . . . . . . . . . . 105--122
           André Naz and   
          Beno\^\it Piranda and   
           Julien Bourgeois and   
           Seth Copen Goldstein   A time synchronization protocol for
                                  large-scale distributed embedded systems
                                  with low-precision clocks and
                                  neighbor-to-neighbor communications  . . 123--142


Journal of Network and Computer Applications
Volume 106, Number ??, March 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 G. Nardini and   
                    G. Stea and   
                  A. Virdis and   
               A. Frangioni and   
                   L. Galli and   
                 D. Sabella and   
                G. M. Dell'Aera   Practical feasibility, scalability and
                                  effectiveness of coordinated scheduling
                                  algorithms in cellular networks towards
                                  5G . . . . . . . . . . . . . . . . . . . 1--16
              Sancheng Peng and   
               Yongmei Zhou and   
                 Lihong Cao and   
                    Shui Yu and   
                Jianwei Niu and   
                     Weijia Jia   Influence analysis in social networks: A
                                  survey . . . . . . . . . . . . . . . . . 17--32
      Shahid Md. Asif Iqbal and   
                    Asaduzzaman   Adaptive forwarding strategies to reduce
                                  redundant Interests and Data in named
                                  data networks  . . . . . . . . . . . . . 33--47
           Lalatendu Muduli and   
         Devi Prasad Mishra and   
               Prasanta K. Jana   Application of wireless sensor network
                                  for environmental monitoring in
                                  underground coal mines: A systematic
                                  review . . . . . . . . . . . . . . . . . 48--67
              Koushik A. M. and   
          Elizabeth Bentley and   
                     Fei Hu and   
                    Sunil Kumar   A hardware testbed for learning-based
                                  spectrum handoff in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 68--77
                Flora Amato and   
            Nicola Mazzocca and   
              Francesco Moscato   Model driven design and evaluation of
                                  security level in orchestrated cloud
                                  services . . . . . . . . . . . . . . . . 78--89
                    Li Yang and   
                   Ziyi Han and   
              Zhengan Huang and   
                    Jianfeng Ma   A remotely keyed file encryption scheme
                                  under mobile cloud computing . . . . . . 90--99
                    Tong Li and   
              Zhengan Huang and   
                    Ping Li and   
                  Zheli Liu and   
                     Chunfu Jia   Outsourced privacy-preserving
                                  classification service over encrypted
                                  data . . . . . . . . . . . . . . . . . . 100--110
                Xiaohui Jin and   
               Baojiang Cui and   
                    Dong Li and   
              Zishuai Cheng and   
                   Congxian Yin   An improved payload-based anomaly
                                  detector for web applications  . . . . . 111--116
                  Jian Shen and   
                 Ziyuan Gui and   
                     Sai Ji and   
                   Jun Shen and   
                 Haowen Tan and   
                        Yi Tang   Cloud-aided lightweight certificateless
                                  authentication protocol with anonymity
                                  for wireless body area networks  . . . . 117--123


Journal of Network and Computer Applications
Volume 107, Number ??, April 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Nourhene Ellouze and   
                Slim Rekhis and   
        Noureddine Boudriga and   
               Mohamed Allouche   Powerless Security for Cardiac
                                  Implantable Medical Devices: Use of
                                  Wireless Identification and Sensing
                                  Platform . . . . . . . . . . . . . . . . 1--21
        Jaume Segura-Garcia and   
    Santiago Felici-Castell and   
           Miguel Garcia-Pineda   Performance evaluation of different
                                  techniques to estimate subjective
                                  quality in live video streaming
                                  applications over LTE-Advance mobile
                                  networks . . . . . . . . . . . . . . . . 22--37
      Shima Pakdaman Tirani and   
                     Avid Avokh   On the performance of sink placement in
                                  WSNs considering energy-balanced
                                  compressive sensing-based data
                                  aggregation  . . . . . . . . . . . . . . 38--55
   José V. V. Sobral and   
    Joel J. P. C. Rodrigues and   
       Ricardo A. L. Rabelo and   
  José C. Lima Filho and   
             Natanael Sousa and   
         Harilton S. Araujo and   
           Raimir Holanda Filho   A framework for enhancing the
                                  performance of Internet of Things
                                  applications based on RFID and WSNs  . . 56--68
                  Yu-an Tan and   
                   Yuan Xue and   
                 Chen Liang and   
                  Jun Zheng and   
              Quanxin Zhang and   
               Jiamin Zheng and   
                   Yuanzhang Li   A root privilege management scheme with
                                  revocable authorization for Android
                                  devices  . . . . . . . . . . . . . . . . 69--82
               Guangquan Xu and   
                    Jia Liu and   
                 Yanrong Lu and   
              Xianjiao Zeng and   
                  Yao Zhang and   
                    Xiaoming Li   A novel efficient MAKA protocol with
                                  desynchronization for anonymous roaming
                                  service in Global Mobility Networks  . . 83--92
        Mukesh Kumar Giluka and   
     Thomas Valerrian Pasca and   
       Tathagat Priyadarshi and   
        Bheemarjuna Reddy Tamma   Enhanced class based dynamic priority
                                  scheduling to support uplink IoT traffic
                                  in LTE-A networks  . . . . . . . . . . . 93--112
                    Jian Xu and   
                 Laiwen Wei and   
                   Yu Zhang and   
                  Andi Wang and   
                 Fucai Zhou and   
                  Chong-zhi Gao   Dynamic Fully Homomorphic
                                  encryption-based Merkle Tree for
                                  lightweight streaming authenticated data
                                  structures . . . . . . . . . . . . . . . 113--124
             Giuseppe Aceto and   
            Valerio Persico and   
         Antonio Pescapé   The role of Information and
                                  Communication Technologies in
                                  healthcare: taxonomies, perspectives,
                                  and challenges . . . . . . . . . . . . . 125--154


Journal of Network and Computer Applications
Volume 108, Number ??, April 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
               Ahsan Saleem and   
                  Abid Khan and   
              Furqan Shahid and   
             M. Masoom Alam and   
          Muhammad Khurram Khan   Recent advancements in garbled
                                  computing: How far have we come towards
                                  achieving secure, efficient and reusable
                                  garbled circuits . . . . . . . . . . . . 1--19
              Pingping Dong and   
                Wenjun Yang and   
              Wensheng Tang and   
               Jiawei Huang and   
               Haodong Wang and   
                     Yi Pan and   
                   Jianxin Wang   Reducing transport latency for short
                                  flows with multipath TCP . . . . . . . . 20--36
            Praveen Kumar P and   
               Syam Kumar P and   
              Alphonse P. J. A.   Attribute based encryption in cloud
                                  computing: A survey, gap analysis, and
                                  future directions  . . . . . . . . . . . 37--52
           Wassila Lalouani and   
             Mohamed Younis and   
                 Nadjib Badache   Interconnecting isolated network
                                  segments through intermittent links  . . 53--63
                 Jiuxin Cao and   
                   Shuai Xu and   
                 Xuelin Zhu and   
                  Renjun Lv and   
                         Bo Liu   Effective fine-grained location
                                  prediction based on user check-in
                                  pattern in LBSNs . . . . . . . . . . . . 64--75
José Francisco Colom and   
                  David Gil and   
               Higinio Mora and   
            Bruno Volckaert and   
          Antonio Manuel Jimeno   Scheduling framework for distributed
                                  intrusion detection systems over
                                  heterogeneous network architectures  . . 76--86
        Muhammad Aqib Javed and   
    Muhammad Shahzad Younis and   
             Siddique Latif and   
               Junaid Qadir and   
                     Adeel Baig   Community detection in networks: A
                                  multidisciplinary review . . . . . . . . 87--111
                 Zechao Liu and   
               Zoe L. Jiang and   
                  Xuan Wang and   
                      S. M. Yiu   Practical attribute-based encryption:
                                  Outsourcing decryption, attribute
                                  revocation and policy updating . . . . . 112--123
             Christian Esposito   Interoperable, dynamic and
                                  privacy-preserving access control for
                                  cloud data storage when integrating
                                  heterogeneous organizations  . . . . . . 124--136


Journal of Network and Computer Applications
Volume 109, Number ??, May 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
             Minh-Tuan Thai and   
               Ying-Dar Lin and   
               Po-Ching Lin and   
                 Yuan-Cheng Lai   Towards load-balanced service chaining
                                  by Hash-based Traffic Steering on
                                  Softswitches . . . . . . . . . . . . . . 1--10
                Souvik Basu and   
             Ayanesh Biswas and   
                  Siuli Roy and   
                   Sipra DasBit   Wise-PRoPHET: A Watchdog supervised
                                  PRoPHET for reliable dissemination of
                                  post disaster situational information
                                  over smartphone based DTN  . . . . . . . 11--23
  Muhammad Ehatisham-ul-Haq and   
        Muhammad Awais Azam and   
                Usman Naeem and   
                 Yasar Amin and   
                   Jonathan Loo   Continuous authentication of smartphone
                                  users based on activity pattern
                                  recognition using passive mobile sensing 24--35
                   Yuan Rao and   
                 Cheng Deng and   
                  Gang Zhao and   
                   Yan Qiao and   
                Lei-yang Fu and   
                  Xing Shao and   
                  Ru-chuan Wang   Self-adaptive implicit contention window
                                  adjustment mechanism for QoS
                                  optimization in wireless sensor networks 36--52
        Mauro A. A. da Cruz and   
    Joel J. P. C. Rodrigues and   
        Arun Kumar Sangaiah and   
           Jalal Al-Muhtadi and   
                Valery Korotaev   Performance evaluation of IoT middleware 53--65
         Ester López and   
                Leandro Navarro   Coordinated detection of forwarding
                                  faults in Wireless Community Networks    66--77
                 Xuangou Wu and   
               Panlong Yang and   
               Shaojie Tang and   
                 Xiao Zheng and   
                   Xiaolin Wang   Privacy-aware data publishing against
                                  sparse estimation attack . . . . . . . . 78--88
                   G. Deepa and   
         P. Santhi Thilagam and   
               Amit Praseed and   
                  Alwyn R. Pais   DetLogic: A black-box approach for
                                  detecting logic vulnerabilities in web
                                  applications . . . . . . . . . . . . . . 89--109


Journal of Network and Computer Applications
Volume 110, Number ??, May 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
              Mostafa Noshy and   
        Abdelhameed Ibrahim and   
              Hesham Arafat Ali   Optimization of live virtual machine
                                  migration in cloud computing: A survey
                                  and future directions  . . . . . . . . . 1--10
               Umber Sheikh and   
                  Abid Khan and   
                Bilal Ahmed and   
               Abdul Waheed and   
                   Abdul Hameed   Provenance Inference Techniques:
                                  Taxonomy, comparative analysis and
                                  design challenges  . . . . . . . . . . . 11--26
            Arsany Guirguis and   
          Mohammed Karmoose and   
                Karim Habak and   
          Mustafa El-Nainay and   
               Moustafa Youssef   Cooperation-based multi-hop routing
                                  protocol for cognitive radio networks    27--42
                 Qiang Yang and   
                     Wei Li and   
       Jose Neuman de Souza and   
               Albert Y. Zomaya   Resilient virtual communication networks
                                  using multi-commodity flow based local
                                  optimal mapping  . . . . . . . . . . . . 43--51
         Vahideh Hayyolalam and   
      Ali Asghar Pourhaji Kazem   A systematic literature review on
                                  QoS-aware service composition and
                                  selection in cloud environment . . . . . 52--74
             Choon Beng Tan and   
   Mohd Hanafi Ahmad Hijazi and   
                   Yuto Lim and   
                  Abdullah Gani   A survey on Proof of Retrievability for
                                  cloud data integrity and availability:
                                  Cloud storage state-of-the-art, issues,
                                  solutions and future trends  . . . . . . 75--86
          Fahri Wisnu Murti and   
      Rahmat Faddli Siregar and   
                 Soo Young Shin   SU-MIMO based uplink non-orthogonal
                                  multiple access for 5G . . . . . . . . . 87--96
                     Jin Li and   
        Aniello Castiglione and   
                   Changyu Dong   Special issue on security in cloud
                                  computing  . . . . . . . . . . . . . . . 97--98
   Agnieszka Jakóbik and   
         Francesco Palmieri and   
               Joanna Kolodziej   Stackelberg games for modeling defense
                                  scenarios against cloud security threats 99--107
                   Dan Liao and   
                     Hui Li and   
                   Gang Sun and   
                 Ming Zhang and   
                   Victor Chang   Location and trajectory privacy
                                  preservation in 5G-Enabled vehicle
                                  social network services  . . . . . . . . 108--118


Journal of Network and Computer Applications
Volume 111, Number ??, June 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
        Suman Bhattacharjee and   
                  Siuli Roy and   
                   Sipra DasBit   DPDRM: A decentralized post-disaster
                                  resource management scheme using energy
                                  efficient smart phone based DTN  . . . .