Journal of Computer Networks and Communications

Table of Contents: 2014

  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 237810
  • - Research Article

Class-Based Constraint-Based Routing with Implemented Fuzzy Logic in MPLS-TE Networks

Michal Pištek | Martin Medvecký
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 923479
  • - Research Article

Recovery of Lost Target Using Target Tracking in Event Driven Clustered Wireless Sensor Network

Shailaja Patil | Ashish Gupta | Mukesh Zaveri
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 128438
  • - Research Article

A Comparative Analysis of Performance of Shared Memory Cluster Computing Interconnection Systems

Minakshi Tripathy | C. R. Tripathy
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 393782
  • - Research Article

A Flexible Approach for Smart Management of Transmissions in Power Line Communications

Mario Collotta | Salvatore Tirrito
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 323754
  • - Research Article

Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks

Meenakshi Panda | P. M. Khilar
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 739504
  • - Research Article

Adaptive Handover Decision Algorithm Based on Multi-Influence Factors through Carrier Aggregation Implementation in LTE-Advanced System

Ibraheem Shayea | Mahamod Ismail | ... | Hafizal Mohamad
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 792063
  • - Research Article

Pairing-Free Certificateless Signature with Security Proof

Wenhao Liu | Qi Xie | ... | Bin Hu
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 747824
  • - Research Article

Performance Analysis of a Modified SC-FDMA-DSCDMA Technique for 4G Wireless Communication

Deepak Kedia | Arti Modi
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 352071
  • - Research Article

A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction

Rajaa Filali | Mohamed Bouhdadi
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 290147
  • - Research Article

Estimation and Statistical Analysis of Human Voice Parameters to Investigate the Influence of Psychological Stress and to Determine the Vocal Tract Transfer Function of an Individual

Puneet Kumar Mongia | R. K. Sharma
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 450194
  • - Research Article

QoS-Based Web Service Discovery in Mobile Ad Hoc Networks Using Swarm Strategies

Filomena de Santis | Delfina Malandrino
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 206867
  • - Research Article

Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression

Divya Selvaraj | Padmavathi Ganapathi
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 803518
  • - Research Article

Fuzzy-Based Adaptive Hybrid Burst Assembly Technique for Optical Burst Switched Networks

Abubakar Muhammad Umaru | Muhammad Shafie Abd Latiff | Yahaya Coulibaly
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 351020
  • - Research Article

Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

Srinivas Kanakala | Venugopal Reddy Ananthula | Prashanthi Vempaty
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 818957
  • - Review Article

Use of Attack Graphs in Security Systems

Vivek Shandilya | Chris B. Simmons | Sajjan Shiva
Journal of Computer Networks and Communications
 Journal metrics
See full report
Acceptance rate7%
Submission to final decision144 days
Acceptance to publication16 days
CiteScore8.900
Journal Citation Indicator0.500
Impact Factor2.0
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.