nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating the bit-split string matching algorithm using Bloom filters
|
Huang, Kun |
|
2010 |
|
15 |
p. 1785-1794 10 p. |
artikel |
2 |
A client/server application as an example for MPEG-4 systems
|
Deicke, J. |
|
1998 |
|
15 |
p. 1302-1309 8 p. |
artikel |
3 |
A combinatorial algorithm for the maximum lifetime data gathering with aggregation problem in sensor networks
|
Kalpakis, Konstantinos |
|
2009 |
|
15 |
p. 1655-1665 11 p. |
artikel |
4 |
Adaptive data aggregation scheme in clustered wireless sensor networks
|
Chen, Huifang |
|
2008 |
|
15 |
p. 3579-3585 7 p. |
artikel |
5 |
Adaptive radio resource with borrowing for multi-operators 3G+ wireless networks with heterogeneous traffic
|
AlQahtani, Salman |
|
2006 |
|
15 |
p. 2945-2951 7 p. |
artikel |
6 |
A distributed middleware infrastructure for personalized services
|
Dikaiakos, Marios D |
|
2004 |
|
15 |
p. 1464-1480 17 p. |
artikel |
7 |
A distributed simulator for network resource management investigation
|
Marzo, Josep L |
|
2003 |
|
15 |
p. 1782-1791 10 p. |
artikel |
8 |
Advances and directions in quality of service management
|
Landfeldt, Bjorn |
|
2005 |
|
15 |
p. 1701-1702 2 p. |
artikel |
9 |
A fast IPv6 packet classification algorithm based on efficient multi-bit selection
|
Gong, Xiangyang |
|
2010 |
|
15 |
p. 1773-1784 12 p. |
artikel |
10 |
A fast string search algorithm for deep packet classification
|
Rafiq, A.N.M.Ehtesham |
|
2004 |
|
15 |
p. 1524-1538 15 p. |
artikel |
11 |
A framework for the design of bank communications systems
|
Sklira, M |
|
2003 |
|
15 |
p. 1775-1781 7 p. |
artikel |
12 |
A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures
|
Palmieri, Francesco |
|
2010 |
|
15 |
p. 1809-1822 14 p. |
artikel |
13 |
A learning automata-based uplink scheduler for supporting real-time multimedia interactive traffic in IEEE 802.16 WiMAX networks
|
Misra, Sudip |
|
2012 |
|
15 |
p. 1871-1881 11 p. |
artikel |
14 |
A mailbox ownership based mechanism for curbing spam
|
Jamali, Nadeem |
|
2008 |
|
15 |
p. 3586-3593 8 p. |
artikel |
15 |
A majorization approach to downlink multiuser VBR video streaming
|
Huang, Yingsong |
|
2012 |
|
15 |
p. 1828-1837 10 p. |
artikel |
16 |
A multi-criteria network-aware service composition algorithm in wireless environments
|
Luo, Yuan-sheng |
|
2012 |
|
15 |
p. 1882-1892 11 p. |
artikel |
17 |
An alternative strategy for location update and paging in mobile networks
|
Quintero, Alejandro |
|
2004 |
|
15 |
p. 1509-1523 15 p. |
artikel |
18 |
Analysis and performance study for coordinated hierarchical cache placement strategies
|
Li, Wenzhong |
|
2010 |
|
15 |
p. 1834-1842 9 p. |
artikel |
19 |
Analysis and placement of storage capacity in large distributed video servers
|
Cholvi, Vicent |
|
2008 |
|
15 |
p. 3604-3612 9 p. |
artikel |
20 |
Analysis of deadline assignment methods in distributed real-time systems
|
Marinca, Dana |
|
2004 |
|
15 |
p. 1412-1423 12 p. |
artikel |
21 |
Analytical modelling in 802.11 ad hoc networks
|
Khawam, Kinda |
|
2011 |
|
15 |
p. 1883-1891 9 p. |
artikel |
22 |
An anti-spam scheme using pre-challenges
|
Roman, Rodrigo |
|
2006 |
|
15 |
p. 2739-2749 11 p. |
artikel |
23 |
An architecture for highly available wide-area service composition
|
Raman, Bhaskaran |
|
2003 |
|
15 |
p. 1727-1740 14 p. |
artikel |
24 |
An efficient bow-based on-demand QoS routing protocol for MIMO ad hoc networks
|
Chen, Yuh-Shyan |
|
2009 |
|
15 |
p. 1613-1630 18 p. |
artikel |
25 |
An enhancement of TCP Veno with forward acknowledgement
|
Zhang, Ke |
|
2008 |
|
15 |
p. 3683-3690 8 p. |
artikel |
26 |
A network management algorithm and protocol for improving QoE in mobile IPTV
|
Lloret, Jaime |
|
2012 |
|
15 |
p. 1855-1870 16 p. |
artikel |
27 |
A new dependable exchange protocol
|
Wang, Hao |
|
2006 |
|
15 |
p. 2770-2780 11 p. |
artikel |
28 |
An interactive cluster-based MDS localization scheme for multimedia information in wireless sensor networks
|
Shon, Minhan |
|
2012 |
|
15 |
p. 1921-1929 9 p. |
artikel |
29 |
A novel stable selection and reliable transmission protocol for clustered heterogeneous wireless sensor networks
|
Zhou, Haibo |
|
2010 |
|
15 |
p. 1843-1849 7 p. |
artikel |
30 |
A passive tree-based backbone construction scheme for MANETs
|
Gao, Zhen G. |
|
2009 |
|
15 |
p. 1631-1641 11 p. |
artikel |
31 |
Applications of agent technology in communications: a review
|
Manvi, S.S |
|
2004 |
|
15 |
p. 1493-1508 16 p. |
artikel |
32 |
A proposal of a cryptography algorithm with techniques of error correction
|
Godoy Júnior, Walter |
|
1997 |
|
15 |
p. 1374-1380 7 p. |
artikel |
33 |
Artificial intelligence approaches to network management: recent advances and a survey
|
Kumar, G.Prem |
|
1997 |
|
15 |
p. 1313-1322 10 p. |
artikel |
34 |
A scalable and collision-free MAC protocol for all-optical ring networks
|
Turuk, Ashok K. |
|
2004 |
|
15 |
p. 1453-1463 11 p. |
artikel |
35 |
A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)
|
Kandikattu, Ramanarayana |
|
2008 |
|
15 |
p. 3707-3718 12 p. |
artikel |
36 |
A smooth broadcasting scheme for VBR-encoded hot videos
|
Yu, Hsiang-Fu |
|
2006 |
|
15 |
p. 2904-2916 13 p. |
artikel |
37 |
A stable rate-based algorithm for active queue management
|
Wang, Chonggang |
|
2005 |
|
15 |
p. 1731-1740 10 p. |
artikel |
38 |
A survey of application level multicast techniques
|
Yeo, C.K. |
|
2004 |
|
15 |
p. 1547-1568 22 p. |
artikel |
39 |
A survey of TCP-friendly router-based AQM schemes
|
Chatranon, Gwyn |
|
2004 |
|
15 |
p. 1424-1440 17 p. |
artikel |
40 |
A user-centric view of QoS-aware communication
|
Michelitsch, Georg |
|
1998 |
|
15 |
p. 1310-1319 10 p. |
artikel |
41 |
Balancing intrusion detection resources in ubiquitous computing networks
|
Zhou, Bo |
|
2008 |
|
15 |
p. 3643-3653 11 p. |
artikel |
42 |
Batch verification of validity of bids in homomorphic e-auction
|
Peng, Kun |
|
2006 |
|
15 |
p. 2798-2805 8 p. |
artikel |
43 |
Building agents for rule-based intrusion detection system
|
Jha, S |
|
2002 |
|
15 |
p. 1366-1373 8 p. |
artikel |
44 |
Calendar
|
|
|
1997 |
|
15 |
p. 1387-1390 4 p. |
artikel |
45 |
Call for papers - Dependable Wireless Sensor Networks
|
|
|
2004 |
|
15 |
p. I- 1 p. |
artikel |
46 |
Call for papers - Emerging Middleware for Next Generation Networks
|
|
|
2004 |
|
15 |
p. II- 1 p. |
artikel |
47 |
Call for papers: Sensor-Actuator Networks (SANETs)
|
|
|
2005 |
|
15 |
p. iv- 1 p. |
artikel |
48 |
Cloud-based image processing system with priority-based data distribution mechanism
|
Wu, Tin-Yu |
|
2012 |
|
15 |
p. 1809-1818 10 p. |
artikel |
49 |
Comparing disk scheduling algorithms for VBR data streams
|
Korst, Jan |
|
1998 |
|
15 |
p. 1328-1343 16 p. |
artikel |
50 |
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing
|
Huitema, George |
|
2010 |
|
15 |
p. 1823-1833 11 p. |
artikel |
51 |
Concurrent Multipath Transfer during path failure
|
Natarajan, Preethi |
|
2009 |
|
15 |
p. 1577-1587 11 p. |
artikel |
52 |
Content-access QoS in peer-to-peer networks using a fast MDS erasure code
|
Dairaine, Laurent |
|
2005 |
|
15 |
p. 1778-1790 13 p. |
artikel |
53 |
Contents Continued
|
|
|
2008 |
|
15 |
p. III- 1 p. |
artikel |
54 |
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
|
Yi, Yunjung |
|
2008 |
|
15 |
p. 3672-3682 11 p. |
artikel |
55 |
Cross-layer multiuser resource allocation for video communication over OFDM networks
|
Ha, Hojin |
|
2008 |
|
15 |
p. 3553-3563 11 p. |
artikel |
56 |
Cryptanalysis of some improved password-authenticated key exchange schemes
|
Phan, Raphael C.-W. |
|
2006 |
|
15 |
p. 2822-2829 8 p. |
artikel |
57 |
Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models
|
Ohbuchi, Ryutarou |
|
1998 |
|
15 |
p. 1344-1354 11 p. |
artikel |
58 |
Depth-color based 3D image transmission over wireless networks with QoE provisions
|
Song, Zhe |
|
2012 |
|
15 |
p. 1838-1845 8 p. |
artikel |
59 |
Description logics for an autonomic IDS event analysis system
|
Yan, W. |
|
2006 |
|
15 |
p. 2841-2852 12 p. |
artikel |
60 |
Design and implementation of a decentralized prototype system for detecting distributed attacks
|
Ning, Peng |
|
2002 |
|
15 |
p. 1374-1391 18 p. |
artikel |
61 |
Design and implementation of an MMS environment on ISODE
|
Cheah, Raymond Seng-Sim |
|
1997 |
|
15 |
p. 1354-1364 11 p. |
artikel |
62 |
Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks
|
Chen, Ching-Wen |
|
2008 |
|
15 |
p. 3725-3738 14 p. |
artikel |
63 |
2-Dilated flattened butterfly: A nonblocking switching topology for high-radix networks
|
Thamarakuzhi, Ajithkumar |
|
2011 |
|
15 |
p. 1822-1835 14 p. |
artikel |
64 |
Distributed media-aware flow scheduling in cloud computing environment
|
Rodrigues, Joel J.P.C. |
|
2012 |
|
15 |
p. 1819-1827 9 p. |
artikel |
65 |
Dynamic adjustable multimedia streaming service architecture over cloud computing
|
Chang, Sung-Yen |
|
2012 |
|
15 |
p. 1798-1808 11 p. |
artikel |
66 |
Dynamic Application Profiles using Neural Networks for adaptive quality of service support in the Internet
|
Tsetsekas, Charilaos A. |
|
2006 |
|
15 |
p. 2985-2995 11 p. |
artikel |
67 |
Dynamic Hello/Timeout timer adjustment in routing protocols for reducing overhead in MANETs
|
Hernandez-Cons, Nelson |
|
2010 |
|
15 |
p. 1864-1878 15 p. |
artikel |
68 |
Dynamic key management schemes for access control in a hierarchy
|
Lin, Chu-Hsing |
|
1997 |
|
15 |
p. 1381-1385 5 p. |
artikel |
69 |
Dynamic Power Management with Scheduled Switching Modes
|
Sausen, Paulo Sérgio |
|
2008 |
|
15 |
p. 3625-3637 13 p. |
artikel |
70 |
Dynamic routing and wavelength assignment algorithms in wavelength division multiplexed translucent optical networks
|
Ye, Yabin |
|
2006 |
|
15 |
p. 2975-2984 10 p. |
artikel |
71 |
Editorial Board
|
|
|
2003 |
|
15 |
p. IFC- 1 p. |
artikel |
72 |
Editorial Board
|
|
|
2008 |
|
15 |
p. IFC- 1 p. |
artikel |
73 |
Editorial for the special issue on Internet Communications Security
|
Sierra, José María |
|
2006 |
|
15 |
p. 2737-2738 2 p. |
artikel |
74 |
Effective bandwidth shaping: a framework for resource dimensioning—extended version
|
Abendroth, D. |
|
2005 |
|
15 |
p. 1703-1710 8 p. |
artikel |
75 |
Efficient and fast retransmission for wireless networks
|
Tseng, Hsueh-Wen |
|
2006 |
|
15 |
p. 2964-2974 11 p. |
artikel |
76 |
Enabling faster and smoother handoffs in AP-dense 802.11 wireless networks
|
Xu, Changqing |
|
2010 |
|
15 |
p. 1795-1803 9 p. |
artikel |
77 |
Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks
|
Choi, Youngkyu |
|
2009 |
|
15 |
p. 1588-1599 12 p. |
artikel |
78 |
Erratum to “Adaptive packet marking for achieving fairness in DiffServ networks” [Comput. Commun. 29 (2006) 52–58]
|
Siris, Vasilios A. |
|
2006 |
|
15 |
p. 3010- 1 p. |
artikel |
79 |
Fair intelligent admission control over resource-feedback DiffServ network
|
Li, Ming |
|
2005 |
|
15 |
p. 1770-1777 8 p. |
artikel |
80 |
Fairness and efficiency of slot reuse algorithms in DQDB MANS
|
Marsan, M.Ajmone |
|
1997 |
|
15 |
p. 1323-1341 19 p. |
artikel |
81 |
Fairness provisioning in multi-hop wireless backhaul networks: Challenges and solutions
|
Lee, Jeng-Farn |
|
2010 |
|
15 |
p. 1767-1772 6 p. |
artikel |
82 |
Fluid-flow modelling of internet traffic in GSM/GPRS networks
|
Irnich, Tim |
|
2003 |
|
15 |
p. 1756-1763 8 p. |
artikel |
83 |
Freeze TCP with timestamps for fast packet loss recovery after disconnections
|
Da Costa, G.M.T. |
|
2003 |
|
15 |
p. 1792-1799 8 p. |
artikel |
84 |
Guest editorial
|
Wolf, Lars |
|
1998 |
|
15 |
p. 1283-1284 2 p. |
artikel |
85 |
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks
|
Liang, Xiaohui |
|
2012 |
|
15 |
p. 1910-1920 11 p. |
artikel |
86 |
IFC - Editorial Board
|
|
|
2010 |
|
15 |
p. IFC- 1 p. |
artikel |
87 |
IFC - Editorial Board
|
|
|
2009 |
|
15 |
p. IFC- 1 p. |
artikel |
88 |
IFC Editorial Board
|
|
|
2006 |
|
15 |
p. CO2- 1 p. |
artikel |
89 |
IFC - Editorial Board
|
|
|
2012 |
|
15 |
p. IFC- 1 p. |
artikel |
90 |
IFC - Editorial Board
|
|
|
2011 |
|
15 |
p. IFC- 1 p. |
artikel |
91 |
IFC Editorial Board - top half
|
|
|
2005 |
|
15 |
p. co2- 1 p. |
artikel |
92 |
IFC Editorial Board - top half
|
|
|
2004 |
|
15 |
p. IFC- 1 p. |
artikel |
93 |
Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control
|
Zhang, Xu |
|
2008 |
|
15 |
p. 3638-3642 5 p. |
artikel |
94 |
Incorporating trust and reputation in the DSR protocol for dependable routing
|
Pirzada, Asad Amir |
|
2006 |
|
15 |
p. 2806-2821 16 p. |
artikel |
95 |
Interactive remote recording and playback of multicast videoconferences
|
Holfelder, Wieland |
|
1998 |
|
15 |
p. 1285-1294 10 p. |
artikel |
96 |
Inter-domain collaborative routing (IDCR): Server selection for optimal client performance
|
Nicholes, Martin O. |
|
2011 |
|
15 |
p. 1798-1809 12 p. |
artikel |
97 |
Intrusion detection techniques and approaches
|
Verwoerd, Theuns |
|
2002 |
|
15 |
p. 1356-1365 10 p. |
artikel |
98 |
Intrusion detection with mobile agents
|
Jansen, Wayne A |
|
2002 |
|
15 |
p. 1392-1401 10 p. |
artikel |
99 |
Jointly optimal congestion control, channel allocation and power control in multi-channel wireless multihop networks
|
Huang, Xin |
|
2011 |
|
15 |
p. 1848-1857 10 p. |
artikel |
100 |
Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks
|
Harhira, Hichem Ayed |
|
2008 |
|
15 |
p. 3700-3706 7 p. |
artikel |
101 |
Lightweight application level multicast tunnelling using mTunnel
|
Parnes, Peter |
|
1998 |
|
15 |
p. 1295-1301 7 p. |
artikel |
102 |
Locating congested segments over the Internet by clustering the delay performance of multiple paths
|
Tachibana, Atsuo |
|
2009 |
|
15 |
p. 1642-1654 13 p. |
artikel |
103 |
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks
|
Xue, Yuyan |
|
2009 |
|
15 |
p. 1666-1676 11 p. |
artikel |
104 |
MINDiT: A framework for media independent access to things
|
Corujo, Daniel |
|
2012 |
|
15 |
p. 1772-1785 14 p. |
artikel |
105 |
Modeling and performance analysis of realizable optical queue with service differentiation capability
|
Shao, Xuguang |
|
2008 |
|
15 |
p. 3654-3661 8 p. |
artikel |
106 |
Modeling and simulation of IEEE 802.11 WLAN mobile ad hoc networks using topology broadcast reverse-path forwarding (TBRPF)
|
Green, D.B. |
|
2003 |
|
15 |
p. 1741-1746 6 p. |
artikel |
107 |
Modeling content delivery networks and their performance
|
Molina, Benjamin |
|
2004 |
|
15 |
p. 1401-1411 11 p. |
artikel |
108 |
Multiple-layer scalable video coding technology based on MB-level data partition for wireless sensor networking
|
Liu, Xingang |
|
2012 |
|
15 |
p. 1846-1854 9 p. |
artikel |
109 |
Multi-stage change-point detection scheme for large-scale simultaneous events
|
Fukushima, Yukinobu |
|
2011 |
|
15 |
p. 1810-1821 12 p. |
artikel |
110 |
Network-aware service placement and selection algorithms on large-scale overlay networks
|
Famaey, J. |
|
2011 |
|
15 |
p. 1777-1787 11 p. |
artikel |
111 |
OBC - Contents
|
|
|
2005 |
|
15 |
p. co4- 1 p. |
artikel |
112 |
OBC - Contents
|
|
|
2006 |
|
15 |
p. CO4- 1 p. |
artikel |
113 |
On the end-to-end flow allocation and channel assignment in multi-channel multi-radio wireless mesh networks with partially overlapped channels
|
Franklin, A. Antony |
|
2011 |
|
15 |
p. 1858-1869 12 p. |
artikel |
114 |
On the implementation of security policies with adaptative encryption
|
Manzanares, Antonio Izquierdo |
|
2006 |
|
15 |
p. 2750-2758 9 p. |
artikel |
115 |
Optical burst switching protocols for supporting QoS and adaptive routing
|
Boudriga, Noureddine |
|
2003 |
|
15 |
p. 1804-1812 9 p. |
artikel |
116 |
Optimization of radio resource management schemes in UMTS using pricing
|
Elayoubi, S.-E. |
|
2005 |
|
15 |
p. 1761-1769 9 p. |
artikel |
117 |
Packet scheduling in input-queued switches with a speedup of less than two and scheduling algorithms for switches with a configuration overhead
|
Bauer, Claus |
|
2005 |
|
15 |
p. 1721-1730 10 p. |
artikel |
118 |
Part-whole dissemination of large multimedia contents in opportunistic networks
|
Belblidia, Nadjet |
|
2012 |
|
15 |
p. 1786-1797 12 p. |
artikel |
119 |
Patterns for constructing CSCW applications in TINA
|
Körner, Eckhart |
|
1998 |
|
15 |
p. 1361-1372 12 p. |
artikel |
120 |
Performance analysis of multi-dimensional packet classification on programmable network processors
|
Srinivasan, Deepa |
|
2005 |
|
15 |
p. 1752-1760 9 p. |
artikel |
121 |
Performance and bandwidth balancing of the register insertion bus (RIB) fiber optic network
|
Ott, James M. |
|
1997 |
|
15 |
p. 1342-1353 12 p. |
artikel |
122 |
Performance evaluation of a new multiaccess protocol for local area networks
|
Papadimitriou, Georgios I. |
|
2003 |
|
15 |
p. 1800-1803 4 p. |
artikel |
123 |
Performance modeling of wireless networks with generally distributed handoff interarrival times
|
Dharmaraja, S. |
|
2003 |
|
15 |
p. 1747-1755 9 p. |
artikel |
124 |
Practical electronic lotteries with offline TTP
|
Chow, Sherman S.M. |
|
2006 |
|
15 |
p. 2830-2840 11 p. |
artikel |
125 |
Practical QoS network system with fault tolerance
|
Lee, S.S. |
|
2003 |
|
15 |
p. 1764-1774 11 p. |
artikel |
126 |
Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints
|
Kao, Yu-Fen |
|
2008 |
|
15 |
p. 3613-3624 12 p. |
artikel |
127 |
Prioritized support of different traffic classes in IEEE 802.11e wireless LANs
|
Passas, Nikos |
|
2006 |
|
15 |
p. 2867-2880 14 p. |
artikel |
128 |
Priority-aware optical shared protection: An offline evaluation study
|
Fawaz, Wissam |
|
2009 |
|
15 |
p. 1677-1684 8 p. |
artikel |
129 |
Protocols for purpose-restricted anonymous communications in IP-based wireless networks
|
Fathi, Hanane |
|
2008 |
|
15 |
p. 3662-3671 10 p. |
artikel |
130 |
PVC management system for the Singapore national high-speed ATM testbed
|
Pillai, R.Radhakrishna |
|
1997 |
|
15 |
p. 1365-1373 9 p. |
artikel |
131 |
QoS multicast aggregation under multiple additive constraints
|
Ben Ali, N. |
|
2008 |
|
15 |
p. 3564-3578 15 p. |
artikel |
132 |
QoS multicast routing using Explore Best Path
|
Singh, Jaipal |
|
2006 |
|
15 |
p. 2881-2894 14 p. |
artikel |
133 |
Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance
|
Weigle, Michele C. |
|
2006 |
|
15 |
p. 2853-2866 14 p. |
artikel |
134 |
Recent advances in computer communications networking
|
Obaidat, M.S. |
|
2003 |
|
15 |
p. 1723-1726 4 p. |
artikel |
135 |
Reinforcement learning-based dynamic bandwidth provisioning for quality of service in differentiated services networks
|
Tham, Chen-Khong |
|
2005 |
|
15 |
p. 1741-1751 11 p. |
artikel |
136 |
Repetition-based cooperative broadcasting for vehicular ad-hoc networks
|
Yoo, Hongseok |
|
2011 |
|
15 |
p. 1870-1882 13 p. |
artikel |
137 |
Research on secure data collection in wireless multimedia sensor networks
|
Lin, Kai |
|
2012 |
|
15 |
p. 1902-1909 8 p. |
artikel |
138 |
Risk assessment in practice: A real case study
|
Benini, Marco |
|
2008 |
|
15 |
p. 3691-3699 9 p. |
artikel |
139 |
Security architecture testing using IDS—a case study
|
Verwoerd, Theuns |
|
2002 |
|
15 |
p. 1402-1412 11 p. |
artikel |
140 |
Security weakness in an authenticated group key agreement protocol in two rounds
|
Hwang, Jung Yeon |
|
2008 |
|
15 |
p. 3719-3724 6 p. |
artikel |
141 |
Self-configured multipath routing using path lifetime for video-streaming services over Ad Hoc networks
|
Aguilar Igartua, Mónica |
|
2010 |
|
15 |
p. 1879-1891 13 p. |
artikel |
142 |
Service index-based fairness scheduling in wireless ad hoc networks
|
Chen, Yong-Qian |
|
2006 |
|
15 |
p. 2934-2944 11 p. |
artikel |
143 |
Service quality support—an overview
|
Räisänen, Vilho |
|
2004 |
|
15 |
p. 1539-1546 8 p. |
artikel |
144 |
Simplified fast handover in mobile IPv6 networks
|
Van Hanh, Nguyen |
|
2008 |
|
15 |
p. 3594-3603 10 p. |
artikel |
145 |
SIP-based Qos support architecture and session management in a combined IntServ and DiffServ networks
|
Cho, Eun-Hee |
|
2006 |
|
15 |
p. 2996-3009 14 p. |
artikel |
146 |
Smart and interactive ubiquitous multimedia services
|
Chen, Min |
|
2012 |
|
15 |
p. 1769-1771 3 p. |
artikel |
147 |
Some common attacks against certified email protocols and the countermeasures
|
Shao, Min-Hua |
|
2006 |
|
15 |
p. 2759-2769 11 p. |
artikel |
148 |
Special issue on Intrusion Detection systems
|
Hunt, Ray |
|
2002 |
|
15 |
p. 1355- 1 p. |
artikel |
149 |
Stability of ALM Tree with selfish receivers: A simulation study
|
Wu, Jianping |
|
2006 |
|
15 |
p. 2895-2903 9 p. |
artikel |
150 |
System for screening objectionable images
|
Ze Wang, James |
|
1998 |
|
15 |
p. 1355-1360 6 p. |
artikel |
151 |
Taxonomy and survey of retransmission-based partially reliable transport protocols
|
Grinnemo, Karl-Johan |
|
2004 |
|
15 |
p. 1441-1452 12 p. |
artikel |
152 |
TCP-aware network coding with opportunistic scheduling in wireless mobile ad hoc networks
|
Nage, Tebatso |
|
2011 |
|
15 |
p. 1788-1797 10 p. |
artikel |
153 |
TCP-Friendly Rate Control (TFRC) for bursty media flows
|
Sathiaseelan, Arjuna |
|
2011 |
|
15 |
p. 1836-1847 12 p. |
artikel |
154 |
The importance of proofs of security for key establishment protocols
|
Raymond Choo, Kim-Kwang |
|
2006 |
|
15 |
p. 2788-2797 10 p. |
artikel |
155 |
The regional movement model for hierarchical mobile IP
|
Zhao, Qinglin |
|
2004 |
|
15 |
p. 1481-1492 12 p. |
artikel |
156 |
Towards self-authenticable smart cards
|
Torres, Joaquin |
|
2006 |
|
15 |
p. 2781-2787 7 p. |
artikel |
157 |
TrainNet: A transport system for delivering non real-time data
|
Zarafshan-Araki, Mohammad |
|
2010 |
|
15 |
p. 1850-1863 14 p. |
artikel |
158 |
Two-layer hierarchical wavelength routing for islands of transparency optical networks
|
Wu, Wenji |
|
2006 |
|
15 |
p. 2952-2963 12 p. |
artikel |
159 |
Understanding the impact of neighboring strategy in peer-to-peer multimedia streaming applications
|
Zhang, Xiangyang |
|
2012 |
|
15 |
p. 1893-1901 9 p. |
artikel |
160 |
Understand traffic locality of peer-to-peer video file swarming
|
Wang, Haiyang |
|
2012 |
|
15 |
p. 1930-1937 8 p. |
artikel |
161 |
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
|
Wang, Lingyu |
|
2006 |
|
15 |
p. 2917-2933 17 p. |
artikel |
162 |
Using cross-layer metrics to improve the performance of end-to-end handover mechanisms
|
Fitzpatrick, John |
|
2009 |
|
15 |
p. 1600-1612 13 p. |
artikel |
163 |
Using software feedback mechanism for distributed MPEG video player systems
|
Lam, K. |
|
1998 |
|
15 |
p. 1320-1327 8 p. |
artikel |
164 |
Wavelength assignment for all-to-all broadcast in WDM optical linear array with limited drops
|
Sabrigiriraj, M. |
|
2010 |
|
15 |
p. 1804-1808 5 p. |
artikel |
165 |
Weighted deficit earliest departure first scheduling
|
Lim, Teck Meng |
|
2005 |
|
15 |
p. 1711-1720 10 p. |
artikel |