Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] R. Zhang, J. Shi, Y. Zhang, and J. Sun, “Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks,” Selected Areas in Comm., IEEE J., vol. 30, no. 2, pp. 433-441, Feb. 2012. [2] R. Zhang, J. Shi, and Y. Zhang, “Secure Multidimensional Range Queries in Sensor Networks,” Proc. ACM MobiHoc ’09, pp. 197-206, 2009. [3] Y. Zhang and S. Zhong, “A Privacy-Preserving Algorithm for Distributed Training of Neural Network Ensembles,” Neural Computing and Applications, pp. 1-14, DOI: 10.1007/s00521-012- 1000-8. [4] W. Fang, F. Liu, F. Yang, L. Shu, and S. Nishio, “Energy-Efficient Cooperative Communication for Data Transmission in Wireless Sensor Networks,” Consumer Electronics, IEEE Trans., vol. 56, no. 4, pp. 2185-2192, Nov. 2010. [5] Y. Li, D. Jin, L. Su, and L. Zeng, “Stability and Scalability Properties for Dynamic Content Updates over Delay Tolerant Networks,” Proc. 20th Int’l Conf. Computer Comm. and Networks (ICCCN ’11), pp. 1-6, Aug. 2011. [6] G. Sollazzo, M. Musolesi, and C. Mascolo, “TACODTN: a Time-Aware Content-Based Dissemination System for Delay Tolerant Networks,” Proc. ACM First Int’l MobiSys Workshop Mobile Opportunistic Networking (MobiOpp ’07), pp. 83-90, 2007. [7] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets,” Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm., pp. 27-34, 2003. [8] A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, “Content-Based Addressing and Routing: A General Model and its Application,” 2000. [9] P.T. Eugster, P.A. Felber, R. Guerraoui, and A.M. Kermarrec, “The Many Faces of Publish/Subscribe,” ACM Computing Surveys, vol. 35, no. 2, pp. 114-131, 2003. [10] A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, “Design and Evaluation of a Wide-Area Event Notification Service,” ACM Trans. Computer Systems, vol. 19, pp. 332-383, Aug. 2001. [11] B.H. Bloom, “Space/Time Trade-Offs in Hash Coding with Allowable Errors,” Comm. ACM, vol. 13, no. 7, pp. 422-426, 1970. [12] Y. Li, Z. Wang, D. Jin, L. Zeng, and S. Chen, “Collaborative Vehicular Content Dissemination with Directional Antennas,” vol. 11, no. 4, pp. 1301-1306, Apr. 2012. [13] Y. Li, G. Su, P. Hui, D. Jin, L. Su, and L. Zeng, “Multiple Mobile Data Offloading through Delay Tolerant Networks,” Proc. Sixth ACM Workshop Challenged Networks, pp. 43-48, http://doi. acm.org/10.1145/2030652.2030665, 2011. [14] C. Liu and J. Wu, “An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks,” Proc. MobiHoc ’09, pp. 105-114, 2009. [15] “Twitter,” http://www.twitter.com. 2013. *10+ A. Carzaniga and A.L. Wolf, “Forwarding in a ContentBased Network,” Proc. SIGCOMM ’03, pp. 163-174, 2003.
![]() | V2I1119.pdf |