Review and analysis of networking challenges in cloud computing (English)
- New search for: Moura, Jose
- New search for: Hutchison, David
- New search for: Moura, Jose
- New search for: Hutchison, David
In:
Journal of network and computer applications
;
60
;
113-129
;
2016
-
ISSN:
- Article (Journal) / Print
-
Title:Review and analysis of networking challenges in cloud computing
-
Contributors:Moura, Jose ( author ) / Hutchison, David ( author )
-
Published in:Journal of network and computer applications ; 60 ; 113-129
-
Publisher:
- New search for: Elsevier Science B.V., Amsterdam
-
Publication date:2016-01-01
-
Size:17 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 004.05
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 004.05 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 60
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trustworthy and effective person-to-person payments over multi-hop MANETsCarminati, Barbara / Ferrari, Elena / Tran, Ngoc Hong et al. | 2015
- 19
-
A survey of network anomaly detection techniquesAhmed, Mohiuddin / Naser Mahmood, Abdun / Hu, Jiankun et al. | 2015
- 32
-
RESTful service composition at a glance: A surveyGarriga, Martin / Mateos, Cristian / Flores, Andres / Cechich, Alejandra / Zunino, Alejandro et al. | 2015
- 54
-
Availability in the cloud: State of the artNabi, Mina / Toeroe, Maria / Khendek, Ferhat et al. | 2015
- 68
-
Comparison-based system-level fault diagnosis protocols for mobile ad-hoc networks: A surveyJarrah, Hazim / Sarkar, Nurul I. / Gutierrez, Jairo et al. | 2015
- 82
-
A survey on mobility-assisted localization techniques in wireless sensor networksHalder, Subir / Ghosal, Amrita et al. | 2015
- 95
-
Web application protection techniques: A taxonomyProkhorenko, Victor / Choo, Kim-Kwang Raymond / Ashman, Helen et al. | 2015
- 113
-
Review and analysis of networking challenges in cloud computingMoura, Jose / Hutchison, David et al. | 2015
- 130
-
Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computerSilva, Natassya B.F. / Pigatto, Daniel F. / Martins, Paulo S. / Branco, Kalinka R.L.J.C et al. | 2015
- 144
-
A novel asymmetric three-party based authentication scheme in wearable devices environmentLiu, Sha / Hu, Shun / Weng, Jian / Zhu, Shuhua / Chen, Zhiyan et al. | 2015
- 155
-
Differentiated forwarding and caching in named-data networkingKim, Yusung / Kim, Younghoon / Bi, Jun / Yeom, Ikjun et al. | 2015
- 170
-
A survey of grid-based searching techniques for large scale distributed dataBakri Bashir, Mohammed / Latiff, Muhammad Shafie Bin Abd / Coulibaly, Yahaya / Yousif, Adil et al. | 2015
- 180
-
I2CC: Interleaving two-level cache with network coding in peer-to-peer VoD systemKao, Hui-Hsiang / Lee, Chung-Nan / Kao, Yung-Cheng / Wu, Peng-Jung et al. | 2015
- 192
-
Applications of wireless sensor networks for urban areas: A surveyRashid, Bushra / Rehmani, Mubashir Husain et al. | 2015
- 220
-
Traffic matrix estimation: A neural network approach with extended input and expectation maximization iterationZhou, Haifeng / Tan, Liansheng / Zeng, Qian / Wu, Chunming et al. | 2015
- A1
-
EditorialAtiquzzaman, Mohammed et al. | 2016
- IFC
-
Editorial board| 2016