Match!
Journal of Network and Computer Applications
IF
5.27
Papers
3449
Papers 3452
1 page of 346 pages (3,452 results)
Newest
Source
#1Bander Al-Zahrani (KAU: King Abdulaziz University)H-Index: 7
#2Omar Sami Oubbati (University of Laghouat)H-Index: 8
Last. Daniyal M. Alghazzawi (KAU: King Abdulaziz University)H-Index: 14
view all 5 authors...
Abstract Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in industries and various sectors of human life to provide a wide range of applications and services. During the last decade, there has been a growing focus of research in the UAV's assistance paradigm as a fundamental concept resulting in the constant improvement between different kinds of ground networks and the hovering UAVs in the sky. Recently, the wide availability of embedded wireless interfa...
Source
#1Mokhtar SellamiH-Index: 3
#2Haithem Mezni (Taibah University)H-Index: 1
Last. Mohand-Said HacidH-Index: 17
view all 3 authors...
Abstract Over the last years, big data has emerged as a new paradigm for the processing and analysis of massive volumes of data. Big data processing has been combined with service and cloud computing, leading to a new class of services called “Big Services”. In this new model, services can be seen as an abstract layer that hides the complexity of the processed big data. To meet users' complex and heterogeneous needs in the era of big data, service reuse is a natural and efficient means that help...
Source
#1Nur Nasuha Daud (Information Technology University)
#2Siti Hafizah Ab Hamid (Information Technology University)H-Index: 12
Last. Nor Badrul Anuar (Information Technology University)H-Index: 33
view all 5 authors...
Abstract Link prediction methods anticipate the likelihood of a future connection between two nodes in a given network. The methods are essential in social networks to infer social interactions or to suggest possible friends to the users. Rapid social network growth trigger link prediction analysis to be more challenging especially with the significant advancement in complex social network modeling. Researchers implement numerous applications related to link prediction analysis in different netw...
Source
#1Wenjuan Li (PolyU: Hong Kong Polytechnic University)
#2Jiao TanH-Index: 1
Last. Yu Wang (GU: Guangzhou University)H-Index: 1
view all 4 authors...
Abstract With the rapid development of mobile devices, smartphones have become common in people's daily lives, i.e., retrieving community happenings and connecting with peers. Due to the convenience, users often store a large amount of private information on their phones (e.g., photos) and use the phone to process sensitive operations (e.g., financial transactions). Thus, there is a great need to protect the devices from unauthorized access in order to avoid privacy leakage and financial loss. P...
Source
#1J.E. Giti (Monash University)
#1J. E. GitiH-Index: 5
Last. R. Gaire (CSIRO: Commonwealth Scientific and Industrial Research Organisation)
view all 5 authors...
Abstract In this paper, we consider deceptive friendly jammers in a half-duplex random wireless network against a group of adaptive eavesdroppers. The destinations, eavesdroppers and friendly jammers are distributed according to homogeneous Poisson point process (HPPP). To the best of our knowledge, we are the first to study such a system model. As we may combine hostile jamming and passive eavesdropping, the secrecy of legitimate communication might be compromised. To combat this and improve se...
Source
#1Shunzhi Jiang (WHU: Wuhan University)H-Index: 1
#2Dengpan Ye (WHU: Wuhan University)H-Index: 9
Last. Zhuoyuan Zheng (WHU: Wuhan University)H-Index: 1
view all 5 authors...
Abstract Massive data is transferred in the Internet of Thing (IoT) every single second. Protecting the security of these data is a crucial task. Steganography is a collection of techniques for concealing the existence of information by embedding it within irrelevant carriers, which could protect security and privacy of the data. Distinct from the cryptography, steganography put emphasis on hiding the existence of the secret. However, the majority of research mainly work on complex algorithm. In...
1 CitationsSource
#1Eder Leao Fernandes (QMUL: Queen Mary University of London)H-Index: 4
#2Elisa Rojas (University of Alcalá)H-Index: 6
Last. Christian Esteve Rothenberg (State University of Campinas)H-Index: 21
view all 8 authors...
Abstract Software switches are pivotal in the Software-Defined Networking (SDN) paradigm, particularly in the early phases of development, deployment and testing. Currently, the most popular one is Open vSwitch (OVS), leveraged in many production-based environments. However, due to its kernel-based nature, OVS is typically complex to modify when additional features or adaptation is required. To this regard, a simpler user-space is key to perform these modifications. In this article, we present a...
Source
#1Chunlin Li (WUT: Wuhan University of Technology)H-Index: 6
#2Mingyang Song (WUT: Wuhan University of Technology)H-Index: 1
Last. Youlong Luo (WUT: Wuhan University of Technology)H-Index: 6
view all 6 authors...
Abstract With the proliferation of smartphones and tablets, large amounts of data are generated at the edge of the network. Edge computing becomes a promising paradigm for the processing of large amounts of data due to its characteristics of low latency, high data throughput, and low traffic pressure. However, the increasing requirements of the novel terminal applications and services on timely content delivery. Further reducing the latency and improving the data service quality are still the ch...
1 CitationsSource
#1Steven M. Hernandez (VCU: Virginia Commonwealth University)H-Index: 1
#2Eyuphan Bulut (VCU: Virginia Commonwealth University)H-Index: 18
Abstract Identifying the positions of mobile devices within indoor environments allows for the development of advanced context-based applications and general environmental awareness. Classic localization methods require GPS; an expensive, high power consuming and inaccurate solution for indoor scenarios. Relative positioning instead allows nodes to recognize location in relation to neighboring nodes without the requirement of GPS. To triangulate their own position however, indoor localization me...
Source
12345678910
Top fields of study
Distributed computing
Wireless sensor network
Computer network
Computer science
Real-time computing
Cloud computing