International Journal of Networking and Virtual Organisations
2002 - 2025
From Inderscience Enterprises Ltd Bibliographic data for series maintained by Sarah Parker (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 20, issue 4, 2019
- Stochastic demand side management in smart grid system pp. 319-339

- Manish Kumar and Cherian Samuel
- PTRE: a probabilistic two-phase replication elimination policy in large-scale distributed storage platforms pp. 340-355

- Ning Han and Dongbo Liu
- Topology-aware approach for reducing power consumption in backbone networks pp. 356-376

- Mohammed Hussein and Abdallatif Abu-Issa
- (De)Mystifying the information and communication technology business model concept pp. 377-399

- Trevor Clohessy, Thomas Acton and Lorraine Morgan
- Mobile learning adoption in Jordan: technology influencing factors pp. 400-417

- Mohammad K. Al-Nawayseh, Aladdin Hussein Baarah, Sultan A. Al-Masaeed and Mohammad M. Alnabhan
Volume 20, issue 3, 2019
- Driving factors of digital strategic actions in competitive dynamics pp. 195-214

- LeWei Hu, Jing Zhao, Jiao Huang and Yajing Li
- Study on core essential elements for O2O business model with value net theory pp. 215-244

- Jiang Ping Wan, Ya Hui Zhu and Qiao Wen Jiang
- Motivation, governance, efficacy and contribution: a social practice model of commons-based peer production pp. 245-264

- Rong Wang
- A novel QoS negotiation model based on intelligent learning technique in clouds pp. 265-283

- Dongbo Liu and Yongjian Li
- A novel scheduling algorithm for data-intensive workflow in virtualised clouds pp. 284-300

- Feng Li
- An efficient replication scheme based on living-replicas estimation for distributed storage platforms pp. 301-317

- Ying Hu
Volume 20, issue 2, 2019
- Privacy-invading mechanisms in e-commerce - a case study on German tourism websites pp. 105-126

- Tatiana Ermakova, Anke Hohensee, Ines Orlamünde and Benjamin Fabian
- An efficient adaptive genetic algorithm technique to improve the neural network performance with aid of adaptive GA operators pp. 127-142

- Katha Kishor Kumar and Suresh Pabboju
- A survey on data stream, big data and real-time pp. 143-167

- Eliza H.A. Gomes, Patrícia D.M. Plentz, Carlos R. De Rolt and Mario A.R. Dantas
- An adaptive redundant reservation admission in virtual cloud environment pp. 168-183

- Dongbo Liu and Yongjian Li
- Energy efficient-dynamic and self-optimised routing in wireless sensor network based on ant colony optimisation pp. 184-194

- Arindam Debnath and Mrinal Kanti Debbarma
Volume 20, issue 1, 2019
- The measurement of gas solid two-phase flow parameters based on electrical capacitance tomography technology pp. 1-13

- Haijun Tian, Yunlong Zhou, Ting Yang and Yanghui Zhao
- IT-enabled inter-organisational relationships and collaborative innovation: integration of IT design and relationships governance pp. 14-34

- Fei Wang, Jing Zhao and LeWei Hu
- Construction of distance teaching platform based on mobile communication technology pp. 35-43

- Hongxia Li
- Prediction in mobile ad hoc network based on fuzzy time series pp. 44-52

- Chunyu Yang
- Priority-based bandwidth allocation and load balancing for multipath IP networks pp. 53-72

- V. Rekha and M. Indiramma
- Adaptive priority-based fair-resource allocation for MIMO-OFDM multicast networks pp. 73-89

- Voruganti Hindumathi and Katta Rama Linga Reddy
- A novel replication scheme based on prediction technology in virtual P2P storage platform pp. 90-103

- Peng Xiao and Tienan Zhang
Volume 19, issue 2/3/4, 2018
- A full-featured efficient clustering mechanism for improving QoS in MANETs pp. 105-132

- Gatete Marcel and A. Kovalan
- ASD: emotions and behavioural-based interventions through social sensor networks pp. 133-152

- Uwizeyimana Faustin, A. Kovalan and Rajkumar Kannan
- Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks pp. 153-175

- Zaid A. Abdulkader, Azizol Abdullah, Mohd Taufik Abdullah and Zuriati Ahmad Zukarnain
- Relay node selection with energy efficient routing using hidden Markov model in wireless sensor networks pp. 176-186

- J. Martin Sahayaraj and J.M. Ganaseakar
- Network lifetime estimation of wireless sensor networks using communication protocols with non-parametric models pp. 187-195

- Govindarajan Saravanan and M.J.S. Rangachar
- Combined vibration and RF harvester technique for energy management in sensor device pp. 196-208

- C. Padmavathy, L.S. Jayashree and A. Rosario
- DTCF: deadline task consolidation first for energy minimisation in cloud data centres pp. 209-233

- P. Sanjeevi and P. Viswanathan
- SIP-based VoIP anomaly detection engine using DTV and ONR pp. 234-256

- Saira Banu and K.M. Mehata
- Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm pp. 257-269

- B.P. Sreejith Vignesh and M. Rajesh Babu
- Hybrid model for enhancement of passenger information management system pp. 270-288

- Munir Kolapo Yahya-Imam, Sellappan Palaniappan and Seyed Mohammadreza Ghadiri
- Energy-based efficient authenticated routing protocol for MANETs for DDOS attacks with minimised power consumption pp. 289-304

- M. Savithri and M. Rajesh Babu
- Energy aware clustered load balancing in cloud computing environment pp. 305-320

- K.R. Remesh Babu and Philip Samuel
- Semantic clustering approach for documents in distributed system framework with multi-node setup pp. 321-340

- R. Priyadarshini and Latha Tamilselvan
- Research on the intellectual traffic flow control system based on multi-agent along with self-governing vehicle and system of wireless sensor network pp. 341-356

- Chengtao Cao
- A novel framework for very high resolution remote sensing image change detection pp. 357-372

- Jie Li, Ning Sun and Jianlong Zhang
- Certain investigations on effective rate adaptation in cognitive radio with channel characteristics pp. 373-384

- B. Suseela and D. Sivakumar
- A secure communication over wireless sensor devices using intelligent arrival estimation algorithm pp. 385-394

- J. Vijitha Ananthi, H. James Deva Koresh, S. Vengatesan and Y. Blessina Anet Glorita
Volume 19, issue 1, 2018
- Contemporary digital business model decision making: a cloud computing supply-side perspective pp. 1-20

- Trevor Clohessy, Thomas Acton and Lorraine Morgan
- Smart phones and surgeons: privacy and legal issues in Australian healthcare pp. 21-33

- Victoria Garwood, Damian Claydon-Platt, Nilmini Wickramasinghe, John Mackay and Philip J. Smart
- Location-based clustering and collaborative filtering for mobile learning pp. 34-49

- Mohammad M. Alnabhan
- Cloud computing security: attacks, threats, risk and solutions pp. 50-71

- Shweta Kaushik and Charu Gandhi
- Research on network design and analysis of TGO topology pp. 72-86

- Shanmuk Srinivas Amiripalli and Veeramallu Bobba
- A multi-policy adaptive scheduling framework in virtual clouds pp. 87-102

- Changsong Liu
Volume 18, issue 4, 2018
- Ant-based self-healing routing for enhancing lifetime of wireless sensor networks pp. 265-278

- Chaganti B.N. Lakshmi and S. Krishna Mohan Rao
- A novel virtual machine scheduling policy based on performance prediction model pp. 279-293

- Dongbo Liu and Yongjian Li
- An accuracy-enhanced cost model for virtual machine migration pp. 294-306

- Tienan Zhang
- Improving scheduling efficiency by probabilistic execution time model in cloud environments pp. 307-322

- Peng Xiao, Dongbo Liu and Kaijian Liang
- Fuzzy logic-based optimised algorithm for mobility robustness and load-balancing in LTE/4G networks pp. 323-337

- Tanu Goyal, Sakshi Kaushal and Arun Kumar Sangaiah
- Optimal neural network to enhance classification accuracy for mining online reviews and opinions using improved PSO pp. 338-356

- B. Dhanalakshmi and Arumugam Chandra Sekar
Volume 18, issue 3, 2018
- Mobility aware MAC protocol for providing energy efficiency and stability in mobile WSN pp. 183-195

- G. Lakshmi Vara Prasad, T. Nalini and Rajendran Sugumar
- EVRC: an economic-based virtual resource co-allocation middleware for clouds pp. 196-210

- Tienan Zhang
- Fuzzy-based trusted security for mobile grid systems pp. 211-226

- Kavitha Bharathi Shanmugam and S. Vengataasalam
- Does social networking ultimately sustain organisational performance? pp. 227-245

- Lobel Trong-Thuy Tran and Wan-Tran Huang
- Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks pp. 246-264

- Ali Mundeth Ahmed and Erakkath Abdu Jasmin
Volume 18, issue 2, 2018
- A lightweight mutual authentication approach for RFID tags in IoT devices pp. 97-111

- Aakanksha Tewari and B.B. Gupta
- Parallel AES algorithm for performance improvement in data analytics security for IoT pp. 112-129

- Narayanan Manikandan and Srinivasan Subha
- Particle swarm optimisation-based DWT for symbol detection in MIMO-OFDM system pp. 130-143

- Asma Bouhlel, Anis Sakly and Mohamed Nejib Mansouri
- Optimal cluster head selection framework to support energy aware routing protocols of wireless sensor network pp. 144-165

- Achyut Shankar and N. Jaisankar
- An energy-efficient frequency scaling technique for virtualised memory in clouds pp. 166-181

- Peng Xiao and Yuan Tian
Volume 18, issue 1, 2018
- The co-evolution of IT competence, organisational agility and entrepreneurial action: a case study of entrepreneurial e-tailers pp. 1-29

- Shan Wang, Youwei Wang and Norm Archer
- Data analysis to uncover critical parameters for performance appraisal of students in higher education pp. 30-50

- Raju Ranjan and Jayanthi Ranjan
- Examining users' switch from online banking to mobile banking pp. 51-66

- Tao Zhou
- Virtual resource pricing scheme in cloud platforms pp. 67-79

- Ying Hu and Ze Xiao
- The application of analytic hierarchy process and fuzzy comprehensive evaluation in the evaluation of ecological security in coal mine areas pp. 80-96

- Xiaoling Ke, Min Feng and Meng Xiang
| |