Author Index Volume 22 (2016)
Ahmadi, M. and E. Zadkhosh, A customized and reconfigurable VLIW-based packet classifier on ρ-VEX (3) 177–192
Al-Haj Baddar, S., A. Merlo and M. Migliardi, Generating statistical insights into network behavior using SKETURE (1) 65– 76
Alimi, V., see Guerar, M. (3) 231–240
Alyatama, A., Dynamic spectrum allocation for orthogonal frequency-division multiplexing optical networks with survivability and multicasting (1) 1– 13
Astrakhantseva, M.A., see Sukhov, A.M. (4) 321–333
Benmohammed, M., see Guerar, M. (3) 231–240
Boldyrev, S.S., see Sukhov, A.M. (4) 321–333
Bukatov, A.A., see Sukhov, A.M. (4) 321–333
Byun, H., A reaction-diffusion mechanisms for node scheduling design of wireless sensor networking systems (4) 309–319
Cai, F. and H. Yu, Index data distribution strategy in a distributed network (1) 43– 53
Chaporkar, P., see Krishnan, S. (2) 125–151
Chen, Y., see Mao, J. (1) 15– 34
Chen, Y., see Mao, J. (1) 55– 64
Choi, D., see Kim, T. (4) 293–307
Das, K., see Pradhan, A.K. (2) 95–111
Daxiang, H., see Ziyi, Y. (2) 169–176
De, T., see Pradhan, A.K. (2) 95–111
Deng, D., see Liu, F. (3) 193–204
Feng, J., see Ren, Z. (4) 281–291
Gao, Z.-M., see Yang, W.-D. (3) 223–230
Ghosh, A., see Pradhan, A.K. (2) 95–111
Gilani, S.M.M., see Xu, C. (4) 253–264
Guerar, M., M. Benmohammed and V. Alimi, Color wheel pin: Usable and resilient ATM authentication (3) 231–240
He, D., see Wang, H. (2) 153–167
Hu, C., see Wang, Q. (2) 113–124
Jia, Y., see Mao, J. (1) 15– 34
Jia, Y., see Mao, J. (1) 55– 64
Jun, S., see Ziyi, Y. (2) 169–176
Kaddour, M., see Tandjaoui, A.F. (3) 205–221
Kim, T., S. Lee, D. Choi and H. Yoon, Protecting secret keys in networked devices with table encoding against power analysis attacks (4) 293–307
Kong, D., see Tao, X. (1) 35– 42
Krishnan, S. and P. Chaporkar, On-line algorithm for optimizing throughput performance of wireless LANs (2) 125–151
Lee, S., see Kim, T. (4) 293–307
Li, Y., see Wang, Q. (2) 113–124
Liang, Z., see Mao, J. (1) 55– 64
Liu, F. and D. Deng, QoS-aware service composition with user preferences and multiple constraints (3) 193–204
Liu, H.-Y., see Yang, W.-D. (3) 223–230
Liu, Y., see Xu, C. (4) 253–264
Ma, H., see Mao, J. (1) 55– 64
Mao, J., H. Ma, Y. Chen, Y. Jia and Z. Liang, Automatic permission inference for hybrid mobile apps (1) 55– 64
Mao, J., R. Wang, Y. Chen and Y. Jia, Detecting injected behaviors in HTML5-based Android applications (1) 15– 34
Merlo, A., see Al-Haj Baddar, S. (1) 65– 76
Migliardi, M., see Al-Haj Baddar, S. (1) 65– 76
Narayan, D.G. and M. Uma, A cross-layer optimization for delay-aware load balancing in multi-radio wireless mesh networks (2) 77– 93
Nayak, A.K., see Prusty, A.R. (4) 265–280
Pervitsky, A.K., see Sukhov, A.M. (4) 321–333
Pradhan, A.K., K. Das, A. Ghosh and T. De, Resource efficient multicast traffic grooming in WDM mesh networks (2) 95–111
Prusty, A.R., S. Sethi and A.K. Nayak, A hybrid multi-hop mobility assisted heterogeneous energy efficient cluster routing protocol for Wireless Ad hoc Sensor Networks (4) 265–280
Qin, Y., see Ren, Z. (4) 281–291
Ren, Z., Y. Qin, Z. Zhao and J. Feng, A nonlinear dynamical chaotic signal reconstruction method in wireless sensor networks with unknown statistics (4) 281–291
Sethi, S., see Prusty, A.R. (4) 265–280
Sukhov, A.M., M.A. Astrakhantseva, A.K. Pervitsky, S.S. Boldyrev and A.A. Bukatov, Generating a function for network delay (4) 321–333
Tandjaoui, A.F. and M. Kaddour, A joint power control, time-sharing and routing scheme to minimize spectrum utilization in wireless mesh networks (3) 205–221
Tao, X., D. Kong and Y. Wang, A parallelized network traffic classification framework based on selective ensemble and diversity measures (1) 35– 42
Tong, W., see Ziyi, Y. (2) 169–176
Uma, M., see Narayan, D.G. (2) 77– 93
Wang, H., Z. Zheng, L. Wu and D. He, New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems (2) 153–167
Wang, K., see Yang, W.-D. (3) 223–230
Wang, Q., C. Hu, X. Wei, B. Xu and Y. Li, VAStream: Virtual adaptive substream partition and scheduling in data-driven P2P live streaming (2) 113–124
Wang, R., see Mao, J. (1) 15– 34
Wang, Y., see Tao, X. (1) 35– 42
Wei, X., see Wang, Q. (2) 113–124
Wu, L., see Wang, H. (2) 153–167
Xiao, X. and X. Zheng, A proposal of survivable virtual network embedding algorithm (3) 241–251
Xu, B., see Wang, Q. (2) 113–124
Xu, C., G.F. Zhao, Y. Liu and S.M.M. Gilani, Charactering network latency in China: A view from gateway (4) 253–264
Yang, W.-D., Z.-M. Gao, K. Wang and H.-Y. Liu, A privacy-preserving data aggregation mechanism for VANETs (3) 223–230
Yoon, H., see Kim, T. (4) 293–307
Yu, H., see Cai, F. (1) 43– 53
Zadkhosh, E., see Ahmadi, M. (3) 177–192
Zhao, G.F., see Xu, C. (4) 253–264
Zhao, Z., see Ren, Z. (4) 281–291
Zheng, X., see Xiao, X. (3) 241–251
Zheng, Z., see Wang, H. (2) 153–167
Zhili, X., see Ziyi, Y. (2) 169–176
Ziyi, Y., S. Jun, H. Daxiang, W. Tong and X. Zhili, Personality as a metric for topic models on social networks (2) 169–176