Author Index Volume 21 (2015)
Babes, M., see Khelifi, M. (4) 313–330
Bagwari, A., J. Kanti, G.S. Tomar and A. Samarah, Reliable spectrum sensing scheme based on dual detector with double-threshold for IEEE 802.22 WRAN (3) 205–220
Barolli, L., see Elmazi, D. (1) 15– 25
Barolli, L., see Liu, Y. (1) 27– 42
Barolli, L., see Matsuo, K. (1) 1– 14
Boudjit, S., see Khelifi, M. (4) 313–330
Bukatov, A.A., see Sultanov, T.G. (3) 155–164
Byun, H., A reliable data delivery scheme with delay constraints for wireless sensor networks (3) 195–203
Chen, X., S. Ouyang and Y. Ding, Energy-aware resource allocation for cooperative cognitive radio dynamic spectrum access networks (2) 131–139
Ding, Y., see Chen, X. (2) 131–139
Ding, Y., see Wang, K. (2) 141–153
Dong, C., see Lu, D. (3) 221–235
Dong, S., see Lu, D. (3) 221–235
El-Zoghdy, S.F. and A.I. Elnashar, A threshold-based load balancing algorithm for grid computing systems (4) 237–257
Elmazi, D., E. Kulla, K. Matsuo, T. Oda, E. Spaho and L. Barolli, A mobility-aware fuzzy-based system for actor selection in wireless sensor–actor networks (1) 15– 25
Elmazi, D., see Matsuo, K. (1) 1– 14
Elnashar, A.I., see El-Zoghdy, S.F. (4) 237–257
Ghanemi, S., see Khelifi, M. (4) 313–330
Gui-Cheng, W. and Y. Jie, A data extraction and layout generation framework for web service (2) 83– 94
Guomin, Z., see Xiulei, W. (4) 285–298
Hänninen, T., see Mikhaylov, K. (3) 165–180
Hou, L., see Wang, K. (2) 141–153
Ikeda, M., see Liu, Y. (1) 27– 42
Jamhour, E., see Mariani, W.C. (1) 57– 68
Jia, C., see Zhao, C. (2) 95–106
Jie, Y., see Gui-Cheng, W. (2) 83– 94
Kanti, J., see Bagwari, A. (3) 205–220
Khelifi, M., M. Babes, S. Ghanemi, M.Y. Saidi and S. Boudjit, Hybrid heuristic for Capacitated Network Design Problem (4) 313–330
Kulla, E., Evaluating the effect of static components in MANET by simulations (4) 273–284
Kulla, E., see Elmazi, D. (1) 15– 25
Li, J., F. Xhafa and J. Weng, Editorial: Emerging services and technologies in wireless networks (2) 81– 82
Li, T., see Wang, K. (2) 141–153
Li, T., see Wang, Y. (3) 181–194
Liu, Q., see Wang, Y. (3) 181–194
Liu, Y., S. Sakamoto, K. Matsuo, M. Ikeda, L. Barolli and F. Xhafa, Improving reliability of JXTA-Overlay P2P platform: A comparison study for two fuzzy-based systems (1) 27– 42
Liu, Y., see Matsuo, K. (1) 1– 14
Liu, Z., see Wang, R. (2) 107–120
Liu, Z., see Wang, Y. (3) 181–194
Lu, D., S. Dong, M. Tao, C. Dong and B. Qiu, A velocity and neighbor density-based broadcast scheme in mobile ad hoc networks (3) 221–235
Mariani, W.C., M.C. Penna, M.E. Pellenz and E. Jamhour, Channel allocation algorithms for co-existence of base stations in IEEE 802.22 networks (1) 57– 68
Matsuda, R., see Shigeyasu, T. (1) 43– 55
Matsuo, K., D. Elmazi, Y. Liu, S. Sakamoto, G. Mino and L. Barolli, FACS-MP: A fuzzy admission control system with many priorities for wireless cellular networks and its performance evaluation (1) 1– 14
Matsuo, K., see Elmazi, D. (1) 15– 25
Matsuo, K., see Liu, Y. (1) 27– 42
Mikhaylov, K. and T. Hänninen, Mechanisms for improving throughput and energy efficiency of Bluetooth Low Energy for multi node environment (3) 165–180
Ming, C., see Xiulei, W. (4) 285–298
Mino, G., see Matsuo, K. (1) 1– 14
Narimani Zaman Abadi, M. and A. Nowroozi, A real-time GPU-based approach for alert aggregation (1) 69– 80
Nowroozi, A., see Narimani Zaman Abadi, M. (1) 69– 80
Oda, T., see Elmazi, D. (1) 15– 25
Ouyang, S., see Chen, X. (2) 131–139
Pellenz, M.E., see Mariani, W.C. (1) 57– 68
Peng, X., see Yang, Y. (4) 299–311
Penna, M.C., see Mariani, W.C. (1) 57– 68
Qiu, B., see Lu, D. (3) 221–235
Saidi, M.Y., see Khelifi, M. (4) 313–330
Sakamoto, S., see Liu, Y. (1) 27– 42
Sakamoto, S., see Matsuo, K. (1) 1– 14
Samarah, A., see Bagwari, A. (3) 205–220
Shigeyasu, T. and R. Matsuda, CA-BMAC: A collision avoidance multi-channel broadcast MAC protocol with a mechanism for reducing transmission overhead (1) 43– 55
Spaho, E., see Elmazi, D. (1) 15– 25
Sukhov, A.M., see Sultanov, T.G. (3) 155–164
Sultanov, T.G., A.M. Sukhov and A.A. Bukatov, Differentiation criterion for classes of network service (3) 155–164
Sun, F., see Wang, K. (2) 141–153
Sun, J., see Wang, Y. (3) 181–194
Tao, M., see Lu, D. (3) 221–235
Tao, M., see Wang, R. (2) 107–120
Tomar, G.S., see Bagwari, A. (3) 205–220
Wan, X., see Yang, Y. (4) 299–311
Wang, K., H. Zhao, Y. Ding, T. Li, L. Hou and F. Sun, Optimization of air pollutant monitoring stations with constraints using genetic algorithm (2) 141–153
Wang, R., Z. Liu, M. Tao and L. Zhang, Identifying Internet background radiation traffic based on traffic source distribution (2) 107–120
Wang, Y., T. Li, Q. Liu, J. Sun and Z. Liu, The impact of social cloud reputation and structure on rational computation (3) 181–194
Weng, J., see Li, J. (2) 81– 82
Xhafa, F., see Li, J. (2) 81– 82
Xhafa, F., see Liu, Y. (1) 27– 42
Xia, C., see Zhao, C. (2) 95–106
Xianglin, W., see Xiulei, W. (4) 285–298
Xiulei, W., C. Ming, W. Xianglin and Z. Guomin, Defending DDoS attacks in software defined networking based on improved Shiryaev–Roberts detection algorithm (4) 285–298
Yang, C. and J. Ye, Secure and efficient fine-grained data access control scheme in cloud computing (4) 259–271
Yang, T., see Zhang, J. (2) 121–129
Yang, Y., X. Peng and X. Wan, Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing (4) 299–311
Ye, J., see Yang, C. (4) 259–271
Zhang, J., T. Yang and C. Zhao, Load balancing and data aggregation tree routing algorithm in wireless sensor networks (2) 121–129
Zhang, L., see Wang, R. (2) 107–120
Zhao, C., C. Xia and C. Jia, Research and analysis on spatial adaptive strategy of End-hopping system (2) 95–106
Zhao, C., see Zhang, J. (2) 121–129
Zhao, H., see Wang, K. (2) 141–153