Journal of Computer Networks and Communications

Table of Contents: 2014

  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 237810
  • - Research Article

Class-Based Constraint-Based Routing with Implemented Fuzzy Logic in MPLS-TE Networks

Michal Pištek | Martin Medvecký
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 923479
  • - Research Article

Recovery of Lost Target Using Target Tracking in Event Driven Clustered Wireless Sensor Network

Shailaja Patil | Ashish Gupta | Mukesh Zaveri
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 128438
  • - Research Article

A Comparative Analysis of Performance of Shared Memory Cluster Computing Interconnection Systems

Minakshi Tripathy | C. R. Tripathy
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 393782
  • - Research Article

A Flexible Approach for Smart Management of Transmissions in Power Line Communications

Mario Collotta | Salvatore Tirrito
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 323754
  • - Research Article

Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks

Meenakshi Panda | P. M. Khilar
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 739504
  • - Research Article

Adaptive Handover Decision Algorithm Based on Multi-Influence Factors through Carrier Aggregation Implementation in LTE-Advanced System

Ibraheem Shayea | Mahamod Ismail | ... | Hafizal Mohamad
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 792063
  • - Research Article

Pairing-Free Certificateless Signature with Security Proof

Wenhao Liu | Qi Xie | ... | Bin Hu
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 747824
  • - Research Article

Performance Analysis of a Modified SC-FDMA-DSCDMA Technique for 4G Wireless Communication

Deepak Kedia | Arti Modi
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 352071
  • - Research Article

A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction

Rajaa Filali | Mohamed Bouhdadi
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 290147
  • - Research Article

Estimation and Statistical Analysis of Human Voice Parameters to Investigate the Influence of Psychological Stress and to Determine the Vocal Tract Transfer Function of an Individual

Puneet Kumar Mongia | R. K. Sharma
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 450194
  • - Research Article

QoS-Based Web Service Discovery in Mobile Ad Hoc Networks Using Swarm Strategies

Filomena de Santis | Delfina Malandrino
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 206867
  • - Research Article

Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression

Divya Selvaraj | Padmavathi Ganapathi
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 803518
  • - Research Article

Fuzzy-Based Adaptive Hybrid Burst Assembly Technique for Optical Burst Switched Networks

Abubakar Muhammad Umaru | Muhammad Shafie Abd Latiff | Yahaya Coulibaly
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 351020
  • - Research Article

Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

Srinivas Kanakala | Venugopal Reddy Ananthula | Prashanthi Vempaty
  • Journal of Computer Networks and Communications -
  • Special Issue
  • Volume 2014
  • - Article ID 818957
  • - Review Article

Use of Attack Graphs in Security Systems

Vivek Shandilya | Chris B. Simmons | Sajjan Shiva
Journal of Computer Networks and Communications
 Journal metrics
Acceptance rate9%
Submission to final decision74 days
Acceptance to publication46 days
CiteScore1.210
Impact Factor-
 Submit

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.