no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A new method for reliability allocation of avionics connected via an airborne network
|
Li, Ruiying |
|
2015 |
48 |
C |
p. 14-21 8 p. |
article |
2 |
A novel framework to mitigate the negative impacts of green techniques on BGP
|
Ruiz-Rivera, Alejandro |
|
2015 |
48 |
C |
p. 22-34 13 p. |
article |
3 |
Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions
|
Liu, Jieyao |
|
2015 |
48 |
C |
p. 99-117 19 p. |
article |
4 |
A recursive Byzantine-resilient protocol
|
Cheng, Chien-Fu |
|
2015 |
48 |
C |
p. 87-98 12 p. |
article |
5 |
Coverage hole and boundary nodes detection in wireless sensor networks
|
Li, Wei |
|
2015 |
48 |
C |
p. 35-43 9 p. |
article |
6 |
Editorial board
|
|
|
2015 |
48 |
C |
p. IFC- 1 p. |
article |
7 |
Energy-efficient algorithms for distributed storage system based on block storage structure reconfiguration
|
Liao, Bin |
|
2015 |
48 |
C |
p. 71-86 16 p. |
article |
8 |
Improving area coverage of wireless sensor networks via controllable mobile nodes: A greedy approach
|
Vecchio, Massimo |
|
2015 |
48 |
C |
p. 1-13 13 p. |
article |
9 |
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
|
Akhunzada, Adnan |
|
2015 |
48 |
C |
p. 44-57 14 p. |
article |
10 |
Reader level filtering for efficient query processing in RFID middleware
|
Kabir, Muhammad Ashad |
|
2015 |
48 |
C |
p. 58-70 13 p. |
article |