Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2 - COMPUTER-COMMUNICATION NETWORKS
Topic C.2.1 - Network Architecture and Design

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
/jucs_22_7/a_semantically_enhanced_service
page 896 - 920
Vol.22 / Issue 12
C. Aguirre, R. Huerta, L. Tsimring:
Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms
/jucs_15_14/optimal_serverless_networks_attacks
page 2747 - 2764
Vol.15 / Issue 14
Ł. Apiecionek, M. Biedziak:
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
/jucs_26_11/fuzzy_adaptive_data_packets
page 1435 - 20
Vol.26 / Issue 11
Ł. Apiecionek, M. Großmann, U.R. Krieger:
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
/jucs_25_6/harmonizing_iot_architectures_with
page 571 - 590
Vol.25 / Issue 6
C. Baladrón, A. Cadenas, J. Aguiar, B. Carro, A. Sánchez-Esguevillas:
Multi-Level Context Management and Inference Framework for Smart Telecommunication Services
/jucs_16_15/multi_level_context_management
page 1973 - 1991
Vol.16 / Issue 15
G. Blinowski, K. Szczypiorski:
Steganography in VLC Systems
/jucs_23_5/steganography_in_vlc_systems
page 454 - 478
Vol.23 / Issue 5
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
/jucs_13_1/duplicate_address_detection_and
page 4 - 31
Vol.13 / Issue 1
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
Impact of Resource Control in Irregular Networks on their Transmission Properties
/jucs_25_6/impact_of_resource_control
page 591 - 610
Vol.25 / Issue 6
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs
/jucs_26_4/analysis_of_the_possibility
page 528 - 546
Vol.26 / Issue 4
L. Campanile, M. Iacono, F. Marulli, M. Mastroianni, N. Mazzocca:
Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices
/jucs_26_11/toward_a_fuzzy_based
page 1455 - 1474
Vol.26 / Issue 11
G. Cattaneo, G. De Maio, U. Ferraro Petrillo:
Security Issues and Attacks on the GSM Standard: a Review
/jucs_19_16/security_issues_and_attacks
page 2437 - 2452
Vol.19 / Issue 16
T. Forzi, M. Peters:
A Methodology and a Toolkit that Integrate Technological, Organisational, and Human Factors to Design KM within Knowledge-Intensive Networks
/jucs_11_4/a_methodology_and_a
page 495 - 525
Vol.11 / Issue 4
L. Fuentes, N. Gámez:
Configuration Process of a Software Product Line for AmI Middleware
/jucs_16_12/configuration_process_of_a
page 1592 - 1611
Vol.16 / Issue 12
A.E. Garcia, K.D. Hackbarth:
Approximation to a Behavioral Model for Estimating Traffic Aggregation Scenarios
/jucs_14_5/approximation_to_a_behavioral
page 731 - 744
Vol.14 / Issue 5
U. Glaesser, R. Karges:
Abstract State Machine Semantics of SDL
/jucs_3_12/abstract_state_machine_semantics
page 1382 - 1414
Vol.3 / Issue 12
S. Lee, H. Kim, C. Kim:
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
/jucs_14_7/a_knowledge_discovery_agent
page 1105 - 1117
Vol.14 / Issue 7
V. Leppaenen:
On Implementing EREW Work-Optimally on Mesh of Trees
/jucs_1_1/on_implementing_erew_work
page 23 - 34
Vol.1 / Issue 1
Q. Liu, M. Chen, J. Zhang, B. Shen, Z. Chu:
Network Planning for WiMAX-R Networks
/jucs_18_9/network_planning_for_wimax
page 1194 - 1217
Vol.18 / Issue 9
J. Luo, W. Wu, M. Yang:
Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks
/jucs_17_14/optimization_of_gateway_deployment
page 2064 - 2083
Vol.17 / Issue 14
P. Martinez-Julia, A.F. Gómez-Skarmeta:
A Novel Identity-based Network Architecture for Next Generation Internet
/jucs_18_12/a_novel_identity_based
page 1643 - 1661
Vol.18 / Issue 12
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
/jucs_18_6/countermeasures_to_prevent_misbehaviour
page 857 - 873
Vol.18 / Issue 6
H. Mousannif, I. Khalil, H. Al Moatassime:
Cooperation as a Service in VANETs
/jucs_17_8/cooperation_as_a_service
page 1202 - 1218
Vol.17 / Issue 8
R. Mueller-Bady, M. Kappes, I. Medina-Bulo, F. Palomo-Lozano:
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures
/jucs_25_7/on_the_automated_and
page 788 - 815
Vol.25 / Issue 7
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
/jucs_13_1/quality_of_service_routing
page 56 - 86
Vol.13 / Issue 1
S. Pal:
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues
/jucs_21_12/extending_mobile_cloud_platforms
page 1594 - 1634
Vol.21 / Issue 12
S. Prabavathy, K. Sundarakantham, S. Shalinie:
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure
/jucs_24_5/design_of_cognitive_fog
page 577 - 602
Vol.24 / Issue 5
L. Rodríguez de Lope, K.D. Hackbarth:
Cost Model for Bitstream Access Services with QoS Parameters
/jucs_14_5/cost_model_for_bitstream
page 653 - 672
Vol.14 / Issue 5
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
/jucs_16_21/impact_of_cpu_bound
page 3299 - 3313
Vol.16 / Issue 21
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11
P.I. Shah, P.A. Shah, S. Yasmin, Z. ur-Rehman, A. Ahmad, Y. Nam, S. Rho:
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
/jucs_24_9/crumbling_walls_log_quorum
page 1282 - 1305
Vol.24 / Issue 9
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
/jucs_16_10/cross_layer_optimization_for
page 1343 - 1367
Vol.16 / Issue 10
W. Stańczuk, J. Lubacz, E. Toczyłowski:
Trading Links and Paths on a Communication Bandwidth Market
/jucs_14_5/trading_links_and_paths
page 642 - 653
Vol.14 / Issue 5
D. Vega, R. Meseguer, F. Freitag, S.F. Ochoa:
Understanding Collaboration in Volunteer Computing Systems
/jucs_20_13/understanding_collaboration_in_volunteer
page 1738 - 1765
Vol.20 / Issue 13
M. Yang, B. Liu, W. Wang, J. Luo, X. Shen:
Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks
/jucs_20_13/maximum_apacity_overlapping_channel
page 1855 - 1874
Vol.20 / Issue 13

Editors:
Zeadally Sherali