nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access protection solution for heavy load unfairness in DQDB
|
Kumar, Lakshmana N |
|
1995 |
89-90 |
12 |
p. 896-910 15 p. |
artikel |
2 |
A computer aided tool for the performance evaluation of next generation WDM wavelength-routed optical networks
|
Eshoul, Abdelhamid E |
|
2004 |
89-90 |
12 |
p. 1197-1205 9 p. |
artikel |
3 |
Addressing the requirements of QoS management for wireless ad hoc networks☆
|
Phanse, Kaustubh S |
|
2003 |
89-90 |
12 |
p. 1263-1273 11 p. |
artikel |
4 |
A distortion-minimizing rate controller for wireless multimedia sensor networks
|
Pudlewski, Scott |
|
2010 |
89-90 |
12 |
p. 1380-1390 11 p. |
artikel |
5 |
Advances in computer communications
|
Obaidat, Mohammad S. |
|
2004 |
89-90 |
12 |
p. 1127-1130 4 p. |
artikel |
6 |
A flexible contention resolution scheme for QoS provisioning in optical burst switching networks
|
Turuk, Ashok K. |
|
2006 |
89-90 |
12 |
p. 2361-2376 16 p. |
artikel |
7 |
A formalisation and evaluation of certificate policies
|
Klobučar, T |
|
1999 |
89-90 |
12 |
p. 1104-1110 7 p. |
artikel |
8 |
A framework for allocating clients to rate-constrained multicast servers
|
Fei, Zongming |
|
2003 |
89-90 |
12 |
p. 1255-1262 8 p. |
artikel |
9 |
A ∑GI i /D/1/∞ queue with heterogeneous input/output slot times
|
Yihong, L. |
|
1999 |
89-90 |
12 |
p. 1136-1149 14 p. |
artikel |
10 |
A high speed scheduler/controller for unbuffered banyan networks
|
Salisbury, C |
|
2001 |
89-90 |
12 |
p. 1158-1169 12 p. |
artikel |
11 |
Algebraic connectivity metric for spare capacity allocation problem in survivable networks
|
Liu, William |
|
2011 |
89-90 |
12 |
p. 1425-1435 11 p. |
artikel |
12 |
A MAC protocol for HFC networks: Design issues and performance evaluation
|
Golmie, Nada |
|
1997 |
89-90 |
12 |
p. 1042-1050 9 p. |
artikel |
13 |
A mechanism to enforce privacy in vehicle-to-infrastructure communication
|
Cencioni, Paolo |
|
2008 |
89-90 |
12 |
p. 2790-2802 13 p. |
artikel |
14 |
A method for multiple channel recovery in TDMA wireless communications systems
|
Ma, Y |
|
2001 |
89-90 |
12 |
p. 1147-1157 11 p. |
artikel |
15 |
A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications
|
Karamad, Ehsan |
|
2008 |
89-90 |
12 |
p. 2898-2906 9 p. |
artikel |
16 |
A modular methodology to verify communication protocols
|
Peng, Wuxu |
|
1997 |
89-90 |
12 |
p. 1069-1077 9 p. |
artikel |
17 |
An adaptive multirate congestion control protocol for multicast communications
|
Rodríguez Pérez, M. |
|
2006 |
89-90 |
12 |
p. 2247-2260 14 p. |
artikel |
18 |
An adaptive protocol for real-time fax communications over Internet
|
Yeo, C.K |
|
2001 |
89-90 |
12 |
p. 1134-1146 13 p. |
artikel |
19 |
An adaptive protocol model for IEEE 802.11 wireless LANs
|
Obaidat, M.S |
|
2004 |
89-90 |
12 |
p. 1131-1136 6 p. |
artikel |
20 |
Analysis of an access node multiplexer in a system serving CBR and VBR traffic
|
Habibi, Daryoush |
|
1993 |
89-90 |
12 |
p. 776-780 5 p. |
artikel |
21 |
An ATM service architecture for the transport of adaptively encoded live video
|
Vickers, Brett J. |
|
1997 |
89-90 |
12 |
p. 1078-1088 11 p. |
artikel |
22 |
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks
|
Sardana, Anjali |
|
2009 |
89-90 |
12 |
p. 1384-1399 16 p. |
artikel |
23 |
An efficient parallel optimization algorithm for the Token Bucket control mechanism
|
Ahmed, N.U. |
|
2006 |
89-90 |
12 |
p. 2281-2293 13 p. |
artikel |
24 |
An efficient preemption-based channel scheduling algorithm for service differentiation in OBS networks
|
Kim, Byung-Chul |
|
2006 |
89-90 |
12 |
p. 2348-2360 13 p. |
artikel |
25 |
An empirical study of TCP/IP performance over ATM 1 This paper was also presented at the Transport Protocols for High Speed Broadband Networks Workshop, at Globecom'96, in Westminster, London, UK, on 22 November, 1996. 1
|
Sebüktekin, Isıl |
|
1998 |
89-90 |
12 |
p. 1058-1069 12 p. |
artikel |
26 |
An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks
|
Zhao, Y.Z. |
|
2010 |
89-90 |
12 |
p. 1452-1461 10 p. |
artikel |
27 |
A non-cooperative game approach for power-aware MAC in ad hoc wireless networks
|
Ghasemi, Abdorasoul |
|
2010 |
89-90 |
12 |
p. 1440-1451 12 p. |
artikel |
28 |
An optimization-oriented view of random early detection
|
Aweya, J |
|
2001 |
89-90 |
12 |
p. 1170-1187 18 p. |
artikel |
29 |
A novel secure communication scheme in vehicular ad hoc networks
|
Wang, Neng-Wen |
|
2008 |
89-90 |
12 |
p. 2827-2837 11 p. |
artikel |
30 |
A novel SVC mechanism for call connection and control in ATM networks
|
Henry, Robert R. |
|
1997 |
89-90 |
12 |
p. 1123-1128 6 p. |
artikel |
31 |
An overview of anonymity technology usage
|
Li, Bingdong |
|
2013 |
89-90 |
12 |
p. 1269-1283 15 p. |
artikel |
32 |
A performance anomaly in clustered on-line transaction processing systems
|
Cai, Hong |
|
2004 |
89-90 |
12 |
p. 1166-1173 8 p. |
artikel |
33 |
A performance comparison of self-organising application layer multicast overlay construction techniques
|
Tan, Su-Wei |
|
2006 |
89-90 |
12 |
p. 2322-2347 26 p. |
artikel |
34 |
Application of online-training SVMs for real-time intrusion detection with different considerations
|
Zhang, Zonghua |
|
2005 |
89-90 |
12 |
p. 1428-1442 15 p. |
artikel |
35 |
Applying formal description techniques to software architectural design
|
Li, J.J |
|
2000 |
89-90 |
12 |
p. 1169-1178 10 p. |
artikel |
36 |
A pricing method for elastic services that guarantees the GoS in a scenario of evolutionary demand
|
Postigo-Boix, Marcos |
|
2013 |
89-90 |
12 |
p. 1317-1328 12 p. |
artikel |
37 |
A QoS-aware policer for a fair resource sharing in wireless ATM
|
Fantacci, Romano |
|
2003 |
89-90 |
12 |
p. 1392-1404 13 p. |
artikel |
38 |
A quasi-static retrieval scheme for interactive VOD servers
|
Sengodan, Senthil |
|
1997 |
89-90 |
12 |
p. 1031-1041 11 p. |
artikel |
39 |
Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks
|
Santa, José |
|
2008 |
89-90 |
12 |
p. 2850-2861 12 p. |
artikel |
40 |
A real-time multicast routing algorithm for multimedia applications
|
Jia, Xiaohua |
|
1997 |
89-90 |
12 |
p. 1098-1106 9 p. |
artikel |
41 |
A scalable method for DCLC problem using hierarchical MDP model
|
Han, Yue |
|
2013 |
89-90 |
12 |
p. 1310-1316 7 p. |
artikel |
42 |
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
|
Li, Chun-Ta |
|
2008 |
89-90 |
12 |
p. 2803-2814 12 p. |
artikel |
43 |
A stochastic model for beaconless IEEE 802.15.4 MAC operation
|
Goyal, M. |
|
2011 |
89-90 |
12 |
p. 1460-1474 15 p. |
artikel |
44 |
A Stop-or-Move Mobility model for PCS networks and its location-tracking strategies
|
Tseng, Yu-Chee |
|
2003 |
89-90 |
12 |
p. 1288-1301 14 p. |
artikel |
45 |
A success story of formal description techniques: Estelle specification and test generation for MIL-STD 188-220
|
Fecko, M.A. |
|
2000 |
89-90 |
12 |
p. 1196-1213 18 p. |
artikel |
46 |
Asynchronous reservation protocol for variable-sized messages in a WDM-based local network
|
Lee, Jae Hwoon |
|
1995 |
89-90 |
12 |
p. 880-888 9 p. |
artikel |
47 |
ATM-over-satellite demonstration of broadband network interconnection
|
Sun, Z |
|
1998 |
89-90 |
12 |
p. 1090-1101 12 p. |
artikel |
48 |
ATM traffic transfer via queued-arbitrated DQDB
|
Venieris, IS |
|
1993 |
89-90 |
12 |
p. 746-758 13 p. |
artikel |
49 |
A topology discovery algorithm for sensor network using smart antennas
|
Khedr, Ahmed M. |
|
2006 |
89-90 |
12 |
p. 2261-2268 8 p. |
artikel |
50 |
A transport protocol for native mode ATM networks design and implementation
|
Karabek, Raschid |
|
1998 |
89-90 |
12 |
p. 1080-1089 10 p. |
artikel |
51 |
Author biographies
|
|
|
1995 |
89-90 |
12 |
p. 997-1001 5 p. |
artikel |
52 |
Author biographies
|
|
|
1994 |
89-90 |
12 |
p. 886-888 3 p. |
artikel |
53 |
Author biographies
|
|
|
1993 |
89-90 |
12 |
p. 806-807 2 p. |
artikel |
54 |
A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks
|
Zhao, Yanxiao |
|
2011 |
89-90 |
12 |
p. 1510-1517 8 p. |
artikel |
55 |
Bandwidth-demand prediction in virtual path in ATM networks using genetic algorithms
|
Swaminathan, N. |
|
1999 |
89-90 |
12 |
p. 1127-1135 9 p. |
artikel |
56 |
BLAST: broadband lightweight ATM secure transport for high-performance distributed computing
|
Dowd, Patrick W |
|
1998 |
89-90 |
12 |
p. 1040-1057 18 p. |
artikel |
57 |
Broadband Access Network; by L.A. Ims; Chapman and Hall, 1998, 370 pages, ISBN 0412828200 (£90.00)
|
Xiang, F |
|
1999 |
89-90 |
12 |
p. 1171- 1 p. |
artikel |
58 |
Building and managing virtual private network; by D. Kosiur; Wiley, New York, USA, 400 pages, ISBN 0471-295264 (£29.50)
|
Lo, C.-C |
|
1999 |
89-90 |
12 |
p. 1173- 1 p. |
artikel |
59 |
Calendar
|
|
|
1996 |
89-90 |
12 |
p. 1020-1023 4 p. |
artikel |
60 |
Calendar
|
|
|
1997 |
89-90 |
12 |
p. 1129-1131 3 p. |
artikel |
61 |
Calendar
|
|
|
1995 |
89-90 |
12 |
p. 1003-1006 4 p. |
artikel |
62 |
Calendar
|
|
|
1993 |
89-90 |
12 |
p. 809-810 2 p. |
artikel |
63 |
Call For Papers: Foundations of Peer to peer Computing
|
|
|
2006 |
89-90 |
12 |
p. II- 1 p. |
artikel |
64 |
Call for Papers: Optical Networking: Systems and Protocols
|
|
|
2006 |
89-90 |
12 |
p. I- 1 p. |
artikel |
65 |
Capacity assignment in computer communication networks with unreliable links
|
Saha, Debashis |
|
1994 |
89-90 |
12 |
p. 871-875 5 p. |
artikel |
66 |
Class-based downlink capacity estimation of a WCDMA network in a multiservice context
|
Dou, Chie |
|
2005 |
89-90 |
12 |
p. 1443-1455 13 p. |
artikel |
67 |
Collection of on-going work
|
Schoo, Peter |
|
1994 |
89-90 |
12 |
p. 889-890 2 p. |
artikel |
68 |
Conference key distribution schemes for portable communication systems
|
Chang, C.-C |
|
1999 |
89-90 |
12 |
p. 1160-1164 5 p. |
artikel |
69 |
Congestion control based dynamic routing in ATM networks
|
Bahk, Saewoong |
|
1994 |
89-90 |
12 |
p. 826-835 10 p. |
artikel |
70 |
Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks
|
Misra, Sudip |
|
2011 |
89-90 |
12 |
p. 1484-1496 13 p. |
artikel |
71 |
Construction of checking sequences based on characterization sets
|
Rezaki, Ali |
|
1995 |
89-90 |
12 |
p. 911-920 10 p. |
artikel |
72 |
Cooperative security in distributed networks
|
Garcia-Morchon, Oscar |
|
2013 |
89-90 |
12 |
p. 1284-1297 14 p. |
artikel |
73 |
Corrigendum to “SNMP information based routing mechanism for fast handoff in mobile IP” [Computer Communications 28 (2005) 1887–1902]
|
Ryu, Sang-Hoon |
|
2006 |
89-90 |
12 |
p. 2446- 1 p. |
artikel |
74 |
CPSCox: A survival analysis model of peer behavior in large scale DHT system
|
Huang, Daochao |
|
2012 |
89-90 |
12 |
p. 1484-1493 10 p. |
artikel |
75 |
Cross-layer rate control, medium access control and routing design in cooperative VANET
|
Zhou, Liang |
|
2008 |
89-90 |
12 |
p. 2870-2882 13 p. |
artikel |
76 |
Design, analysis, and evaluation of an improved scheme for ATM burst-level admission control
|
Moh, W.Melody |
|
1997 |
89-90 |
12 |
p. 1107-1122 16 p. |
artikel |
77 |
Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees
|
Cho, K.-H. |
|
1999 |
89-90 |
12 |
p. 1150-1159 10 p. |
artikel |
78 |
Design and evaluation of feedback consolidation for ABR point-to-multipoint connections in ATM networks
|
Fahmy, S. |
|
1999 |
89-90 |
12 |
p. 1085-1103 19 p. |
artikel |
79 |
Design and implementation of electronic toll collection system based on vehicle positioning system techniques
|
Lee, Wei-Hsun |
|
2008 |
89-90 |
12 |
p. 2925-2933 9 p. |
artikel |
80 |
Design and performance analysis of an inductive QoS routing algorithm
|
Mellouk, Abdelhamid |
|
2009 |
89-90 |
12 |
p. 1371-1376 6 p. |
artikel |
81 |
Design a novel fairness model in WiMAX mesh networks
|
Wang, Hanwu |
|
2012 |
89-90 |
12 |
p. 1447-1456 10 p. |
artikel |
82 |
Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks
|
Qing, Li |
|
2006 |
89-90 |
12 |
p. 2230-2237 8 p. |
artikel |
83 |
Design of new real-time models for tight upper bound approximation of cell loss ratio in ATM networks
|
Haghighat, A.T. |
|
2003 |
89-90 |
12 |
p. 1225-1239 15 p. |
artikel |
84 |
Design of universal personal computing using SDL
|
Törö, M |
|
2000 |
89-90 |
12 |
p. 1124-1134 11 p. |
artikel |
85 |
Design, optimization and performance evaluation of a content distribution overlay for streaming
|
Caviglione, Luca |
|
2011 |
89-90 |
12 |
p. 1497-1509 13 p. |
artikel |
86 |
Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks
|
Ejaz, Waleed |
|
2013 |
89-90 |
12 |
p. 1341-1349 9 p. |
artikel |
87 |
Distributed packet pairing for reflector based DDoS attack mitigation
|
Al-Duwairi, Basheer |
|
2006 |
89-90 |
12 |
p. 2269-2280 12 p. |
artikel |
88 |
Distributed path finding algorithm for stream multicast
|
Xiaofeng Jiang, |
|
1993 |
89-90 |
12 |
p. 767-775 9 p. |
artikel |
89 |
Dynamic location strategy for hot mobile subscribers in personal communications
|
Lin, Hwa-Chuan |
|
2003 |
89-90 |
12 |
p. 1353-1364 12 p. |
artikel |
90 |
Dynamic robust power allocation games under channel uncertainty and time delays
|
Tembine, Hamidou |
|
2011 |
89-90 |
12 |
p. 1529-1537 9 p. |
artikel |
91 |
EDIpro — an integrated environment for electronic data interchange
|
Zazula, Damjan |
|
1994 |
89-90 |
12 |
p. 876-885 10 p. |
artikel |
92 |
Editorial
|
|
|
1998 |
89-90 |
12 |
p. 1039- 1 p. |
artikel |
93 |
Editorial Board
|
|
|
2004 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
94 |
Editorial Board
|
|
|
2008 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
95 |
Editorial Board
|
|
|
2003 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
96 |
Effect of capture on throughput of variable length packet Aloha systems
|
Clark Robertson, R |
|
1994 |
89-90 |
12 |
p. 836-842 7 p. |
artikel |
97 |
Effect of fault tolerance and communication delay on response time in a multiprocessor system with a bus topology
|
Bataineh, Sameer |
|
1994 |
89-90 |
12 |
p. 843-851 9 p. |
artikel |
98 |
Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol
|
de Fez, Ismael |
|
2013 |
89-90 |
12 |
p. 1298-1309 12 p. |
artikel |
99 |
Effects of node processing time on optimal load balancing in tree hierarchy network configurations
|
Jie Li, |
|
1993 |
89-90 |
12 |
p. 781-793 13 p. |
artikel |
100 |
Efficient nearer-ancestor algorithm for network routing
|
Lam, Kwok-Yan |
|
1996 |
89-90 |
12 |
p. 1014-1019 6 p. |
artikel |
101 |
Erratum to “Scalability and traffic control in IP networks” [Editorial of Special Issue 26 (2003) 203]
|
Fahmy, Sonia |
|
2003 |
89-90 |
12 |
p. 1432- 1 p. |
artikel |
102 |
Ethernet networks
|
Weik, Hartmut |
|
2003 |
89-90 |
12 |
p. 1426- 1 p. |
artikel |
103 |
EuQoS: End-to-End Quality of Service over Heterogeneous Networks
|
Mingozzi, E. |
|
2009 |
89-90 |
12 |
p. 1355-1370 16 p. |
artikel |
104 |
Experience with RT-LOTOS, a temporal extension of the LOTOS formal description technique
|
Courtiat, J.-P. |
|
2000 |
89-90 |
12 |
p. 1104-1123 20 p. |
artikel |
105 |
Explicit routing in multicast overlay networks
|
Braun, Torsten |
|
2006 |
89-90 |
12 |
p. 2201-2216 16 p. |
artikel |
106 |
Exploiting the temporal dimension in QoS-aware multicast routing
|
Tseng, C.J. |
|
2003 |
89-90 |
12 |
p. 1274-1287 14 p. |
artikel |
107 |
Feature selection for optimizing traffic classification
|
Zhang, Hongli |
|
2012 |
89-90 |
12 |
p. 1457-1471 15 p. |
artikel |
108 |
File recovery by ISO FTAM
|
Poo, Gee-Swee |
|
1993 |
89-90 |
12 |
p. 798-805 8 p. |
artikel |
109 |
Firewalls in an OSI-environment
|
Berge, Nils Harald |
|
1996 |
89-90 |
12 |
p. 982-989 8 p. |
artikel |
110 |
Formal description of distributed multimedia systems: an assessment of potential techniques
|
Bowman, Howard |
|
1995 |
89-90 |
12 |
p. 964-977 14 p. |
artikel |
111 |
Formal language for security services base modelling and analysis
|
Trček, Denis |
|
1995 |
89-90 |
12 |
p. 921-928 8 p. |
artikel |
112 |
Frame-counter scheduler: A novel QoS scheduler for real-time traffic
|
(Guran) Schmidt, S. Ece |
|
2006 |
89-90 |
12 |
p. 2181-2200 20 p. |
artikel |
113 |
GLP: A cryptographic approach for group location privacy
|
Ashouri-Talouki, Maede |
|
2012 |
89-90 |
12 |
p. 1527-1533 7 p. |
artikel |
114 |
Graceful degradation of loss-tolerant QoS using (m,k)-firm constraints in guaranteed rate networks
|
Koubâa, Anis |
|
2005 |
89-90 |
12 |
p. 1393-1409 17 p. |
artikel |
115 |
Hierarchical distributed data classification in wireless sensor networks
|
Cheng, Xu |
|
2010 |
89-90 |
12 |
p. 1404-1413 10 p. |
artikel |
116 |
ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer
|
Chen, Yung-Hsiang |
|
1995 |
89-90 |
12 |
p. 993-996 4 p. |
artikel |
117 |
IFC - Editorial Board
|
|
|
2010 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
118 |
IFC - Editorial Board
|
|
|
2009 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
119 |
IFC Editorial Board
|
|
|
2006 |
89-90 |
12 |
p. CO2- 1 p. |
artikel |
120 |
IFC - Editorial Board
|
|
|
2013 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
121 |
IFC - Editorial Board
|
|
|
2011 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
122 |
IFC - Editorial Board
|
|
|
2012 |
89-90 |
12 |
p. IFC- 1 p. |
artikel |
123 |
IFC Editorial Board - top half
|
|
|
2005 |
89-90 |
12 |
p. co2- 1 p. |
artikel |
124 |
Improving the efficiency of automated protocol implementations using a configurable FDT compiler
|
Koenig, H |
|
2000 |
89-90 |
12 |
p. 1179-1195 17 p. |
artikel |
125 |
Incorporating priority scheme in IPv6 over ATM networks
|
Zhang, L |
|
1999 |
89-90 |
12 |
p. 1111-1122 12 p. |
artikel |
126 |
Index to volume 18 (1995)
|
|
|
1995 |
89-90 |
12 |
p. 1007-1012 6 p. |
artikel |
127 |
Index to volume 17 (1994)
|
|
|
1994 |
89-90 |
12 |
p. 891-896 6 p. |
artikel |
128 |
Index to Volume 16 (1993)
|
|
|
1993 |
89-90 |
12 |
p. 811-816 6 p. |
artikel |
129 |
Inefficiency of MaxWeight scheduling in spatial wireless networks
|
van de Ven, P.M. |
|
2013 |
89-90 |
12 |
p. 1350-1359 10 p. |
artikel |
130 |
Intelligent Broadband Networks; by I. Venieris, H. Hussmann; Wiley, New York, 330 pages, ISBN 0471980943, £50.00
|
Zhang, L |
|
1999 |
89-90 |
12 |
p. 1173- 1 p. |
artikel |
131 |
Interconnection network front-end controller combining to reduce hot spots effects
|
Sharif, Hamid |
|
1997 |
89-90 |
12 |
p. 1089-1097 9 p. |
artikel |
132 |
Interference and power constrained broadcast and multicast routing in wireless ad hoc networks using directional antennas
|
Li, Zheng |
|
2010 |
89-90 |
12 |
p. 1428-1439 12 p. |
artikel |
133 |
Interference Aware-based Ad-Hoc On Demand Distance Vector (IA-AODV) ultra wideband system routing protocol
|
De Rango, Floriano |
|
2011 |
89-90 |
12 |
p. 1475-1483 9 p. |
artikel |
134 |
Interference-aware channel assignment in a metropolitan multi-radio wireless mesh network with directional antennas
|
Siris, Vasilios A. |
|
2011 |
89-90 |
12 |
p. 1518-1528 11 p. |
artikel |
135 |
Internet Communications Using SIP
|
Weik, Hartmut |
|
2003 |
89-90 |
12 |
p. 1428- 1 p. |
artikel |
136 |
Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks
|
Blough, Douglas |
|
2010 |
89-90 |
12 |
p. 1369- 1 p. |
artikel |
137 |
Intrusion detection through learning behavior model
|
Balajinath, B |
|
2001 |
89-90 |
12 |
p. 1202-1212 11 p. |
artikel |
138 |
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
|
Puzmanova, Rita |
|
2003 |
89-90 |
12 |
p. 1431- 1 p. |
artikel |
139 |
JPEG based scalable image compression
|
Panchanathan, S. |
|
1996 |
89-90 |
12 |
p. 1001-1013 13 p. |
artikel |
140 |
Kinetic mobility management applied to vehicular ad hoc network protocols
|
Härri, Jérôme |
|
2008 |
89-90 |
12 |
p. 2907-2924 18 p. |
artikel |
141 |
Level the buffer wall: Fair channel assignment in wireless sensor networks
|
Yang, Yanyan |
|
2010 |
89-90 |
12 |
p. 1370-1379 10 p. |
artikel |
142 |
Measuring long-term location privacy in vehicular communication systems
|
Ma, Zhendong |
|
2010 |
89-90 |
12 |
p. 1414-1427 14 p. |
artikel |
143 |
Measuring web feature impacts in Peer-to-Peer file sharing systems
|
Yang, Sirui |
|
2009 |
89-90 |
12 |
p. 1418-1425 8 p. |
artikel |
144 |
M|G|1 priority scheduling with discrete pre-emption points: on the impacts of fragmentation on IP QoS
|
Fidler, Markus |
|
2004 |
89-90 |
12 |
p. 1183-1196 14 p. |
artikel |
145 |
Mobility protocols for ITS/VANET
|
Chao, Han-Chieh |
|
2008 |
89-90 |
12 |
p. 2765-2766 2 p. |
artikel |
146 |
Modeling and analysis of PC-based software routers
|
Salah, K. |
|
2010 |
89-90 |
12 |
p. 1462-1470 9 p. |
artikel |
147 |
Modeling and optimization of survivable P2P multicasting
|
Walkowiak, Krzysztof |
|
2011 |
89-90 |
12 |
p. 1410-1424 15 p. |
artikel |
148 |
Modeling location management in wireless networks with generally distributed parameters
|
Zhang, Yan |
|
2006 |
89-90 |
12 |
p. 2386-2395 10 p. |
artikel |
149 |
Modified distributed snapshots algorithm for protocol stabilization
|
Saleh, Kassem |
|
1994 |
89-90 |
12 |
p. 863-870 8 p. |
artikel |
150 |
Modular multicast ATM switching architecture
|
Liaw, Ji-Horng |
|
1995 |
89-90 |
12 |
p. 929-935 7 p. |
artikel |
151 |
Multiple connections in data communication and advanced applications
|
Boudriga, Nuoureddine |
|
1997 |
89-90 |
12 |
p. 1051-1058 8 p. |
artikel |
152 |
Network access protocol for hard real-time communication systems
|
Ulusoy, Özgür |
|
1995 |
89-90 |
12 |
p. 943-948 6 p. |
artikel |
153 |
[No title]
|
Lai, R |
|
2000 |
89-90 |
12 |
p. 1087-1088 2 p. |
artikel |
154 |
OBC - Contents
|
|
|
2006 |
89-90 |
12 |
p. CO4- 1 p. |
artikel |
155 |
OBC - Contents
|
|
|
2005 |
89-90 |
12 |
p. co4- 1 p. |
artikel |
156 |
ODA implementation for multimedia teleservices
|
Baier, R |
|
1995 |
89-90 |
12 |
p. 889-895 7 p. |
artikel |
157 |
Off-line incentive mechanism for long-term P2P backup storage
|
Gramaglia, Marco |
|
2012 |
89-90 |
12 |
p. 1516-1526 11 p. |
artikel |
158 |
On accuracy of region based localization algorithms for wireless sensor networks
|
Zhang, Shigeng |
|
2010 |
89-90 |
12 |
p. 1391-1403 13 p. |
artikel |
159 |
On content delivery network implementation
|
Molina Moreno, B. |
|
2006 |
89-90 |
12 |
p. 2396-2412 17 p. |
artikel |
160 |
Online NetFPGA decision tree statistical traffic classifier
|
Monemi, Alireza |
|
2013 |
89-90 |
12 |
p. 1329-1340 12 p. |
artikel |
161 |
On the dynamic allocation of resources using linear prediction of aggregate network traffic
|
López-Guerrero, Miguel |
|
2003 |
89-90 |
12 |
p. 1341-1352 12 p. |
artikel |
162 |
On the effectiveness of the many-sources asymptotic for admission control
|
Fernández-Veiga, M. |
|
2003 |
89-90 |
12 |
p. 1376-1391 16 p. |
artikel |
163 |
On the security of Wu and Yeh's conference key distribution system
|
Hwang, Tzonelih |
|
1995 |
89-90 |
12 |
p. 978-981 4 p. |
artikel |
164 |
On the use of adaptive grouping protocols under asymmetric bursty traffic
|
Papadimitriou, Georgios I |
|
2004 |
89-90 |
12 |
p. 1137-1142 6 p. |
artikel |
165 |
On the use of out-of-band signaling in ad hoc wireless networks
|
Manoj, B.S |
|
2003 |
89-90 |
12 |
p. 1405-1414 10 p. |
artikel |
166 |
Optical nonlinear effects on the performance of IP traffic over GMPLS-based DWDM networks
|
Tang, Junhua |
|
2003 |
89-90 |
12 |
p. 1330-1340 11 p. |
artikel |
167 |
Optimal placement of multicast and wavelength converting nodes in multicast optical virtual private network
|
Yong, Keen-Mun |
|
2006 |
89-90 |
12 |
p. 2169-2180 12 p. |
artikel |
168 |
Optimal setup of interference threshold in a multi-cell WCDMA environment
|
Kim, Jae-Hoon |
|
2003 |
89-90 |
12 |
p. 1415-1418 4 p. |
artikel |
169 |
Optimal transmission schemes for parallel and fading Gaussian broadcast channels with an energy harvesting rechargeable transmitter
|
Ozel, Omur |
|
2013 |
89-90 |
12 |
p. 1360-1372 13 p. |
artikel |
170 |
Overload control in SIP networks using no explicit feedback: A window based approach
|
Azhari, Seyed Vahid |
|
2012 |
89-90 |
12 |
p. 1472-1483 12 p. |
artikel |
171 |
Packet-based scheduling algorithm for CIOQ switches with multiple traffic classes
|
Lee, Tsern-Huei |
|
2005 |
89-90 |
12 |
p. 1410-1415 6 p. |
artikel |
172 |
PCPGSD: An enhanced GSD service discovery protocol for MANETs
|
Gao, Zhenguo |
|
2006 |
89-90 |
12 |
p. 2433-2445 13 p. |
artikel |
173 |
p-Cycle protection at the glass fiber level
|
Onguetou, Diane Prisca |
|
2011 |
89-90 |
12 |
p. 1399-1409 11 p. |
artikel |
174 |
Performance analysis of session initiation protocol based call set-up over satellite-UMTS network
|
Kueh, Victor Y.H. |
|
2005 |
89-90 |
12 |
p. 1416-1427 12 p. |
artikel |
175 |
Performance evaluation of a generalized hybrid TDMA/CDMA protocol for wireless multimedia with QoS adaptations
|
Boukerche, Azzedine |
|
2005 |
89-90 |
12 |
p. 1468-1480 13 p. |
artikel |
176 |
Performance evaluation of subflow capable SCTP
|
Zou, Jianping |
|
2006 |
89-90 |
12 |
p. 2413-2432 20 p. |
artikel |
177 |
Performance of Bluetooth bridge scheduling algorithms
|
Mišić, Jelena |
|
2004 |
89-90 |
12 |
p. 1143-1151 9 p. |
artikel |
178 |
Performance of dilated banyan network with back-pressure mechanism
|
Youn, Young Sik |
|
1996 |
89-90 |
12 |
p. 972-981 10 p. |
artikel |
179 |
Performance of PRMA in a mobile radio channel
|
Chua, KC |
|
1995 |
89-90 |
12 |
p. 982-987 6 p. |
artikel |
180 |
Performance of TCP over UBR in ATM with EPD and virtual queuing techniques
|
Tzeng, Hong-Yi |
|
1998 |
89-90 |
12 |
p. 1070-1079 10 p. |
artikel |
181 |
Performance study of buffer management schemes under multicasting traffic in ATM switching nodes
|
Sheta, Khalid H. |
|
1997 |
89-90 |
12 |
p. 1059-1068 10 p. |
artikel |
182 |
PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
|
Huang, Chung-Ming |
|
2008 |
89-90 |
12 |
p. 2815-2826 12 p. |
artikel |
183 |
PoX: Protecting users from malicious Facebook applications
|
Egele, Manuel |
|
2012 |
89-90 |
12 |
p. 1507-1515 9 p. |
artikel |
184 |
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS
|
Kousalya, G. |
|
2008 |
89-90 |
12 |
p. 2781-2789 9 p. |
artikel |
185 |
Priority shaping of source traffic in ATM B-ISDN
|
Reiss, Leszek K |
|
1993 |
89-90 |
12 |
p. 794-797 4 p. |
artikel |
186 |
Proactive resource provisioning
|
Chi, Eric |
|
2004 |
89-90 |
12 |
p. 1174-1182 9 p. |
artikel |
187 |
Protection performance components in MPLS networks
|
Calle, Eusebi |
|
2004 |
89-90 |
12 |
p. 1220-1228 9 p. |
artikel |
188 |
Providing resiliency for optical grids by exploiting relocation: A dimensioning study based on ILP
|
Buysse, J. |
|
2011 |
89-90 |
12 |
p. 1389-1398 10 p. |
artikel |
189 |
Providing VANET security through active position detection
|
Yan, Gongjun |
|
2008 |
89-90 |
12 |
p. 2883-2897 15 p. |
artikel |
190 |
QoS multicast routing for multimedia group communications using intelligent computational methods
|
Wang, Xingwei |
|
2006 |
89-90 |
12 |
p. 2217-2229 13 p. |
artikel |
191 |
QoS-sensitive admission policy for non-real-time data packets in voice/data integrated CDMA systems
|
Koo, Insoo |
|
2003 |
89-90 |
12 |
p. 1419-1425 7 p. |
artikel |
192 |
Quorum based sink location service for irregular wireless sensor networks
|
Yu, Fucai |
|
2012 |
89-90 |
12 |
p. 1422-1432 11 p. |
artikel |
193 |
Reactive firewalls—a new technique
|
Hunt, Ray |
|
2003 |
89-90 |
12 |
p. 1302-1317 16 p. |
artikel |
194 |
Real-time applications in a CRMA network: a performance analysis
|
Anastasi, G |
|
1995 |
89-90 |
12 |
p. 871-879 9 p. |
artikel |
195 |
Relational-based calculus for trust management in networked services
|
Guemara-ElFatmi, Sihem |
|
2004 |
89-90 |
12 |
p. 1206-1219 14 p. |
artikel |
196 |
Remote login authentication scheme based on a geometric approach
|
Wu, Tzong-Chen |
|
1995 |
89-90 |
12 |
p. 959-963 5 p. |
artikel |
197 |
Remote scheme for password authentication based on theory of quadratic residues
|
Chang, Chin-Chen |
|
1995 |
89-90 |
12 |
p. 936-942 7 p. |
artikel |
198 |
Replay tolerance of authentication protocols
|
Lam, Kwok-Yan |
|
1995 |
89-90 |
12 |
p. 988-992 5 p. |
artikel |
199 |
Reputation management algorithms for DHT-based peer-to-peer environment
|
Fedotova, Natalya |
|
2009 |
89-90 |
12 |
p. 1400-1409 10 p. |
artikel |
200 |
Request-driven swarming scheme for P2P data streaming
|
Xu, Jialing |
|
2009 |
89-90 |
12 |
p. 1410-1417 8 p. |
artikel |
201 |
Rerouting in advance reservation networks
|
Xie, Chongyang |
|
2012 |
89-90 |
12 |
p. 1411-1421 11 p. |
artikel |
202 |
Restoration in multi-domain GMPLS-based networks
|
Manolova, Anna |
|
2011 |
89-90 |
12 |
p. 1450-1459 10 p. |
artikel |
203 |
Robust network planning in nonuniform traffic scenarios
|
Tizghadam, Ali |
|
2011 |
89-90 |
12 |
p. 1436-1449 14 p. |
artikel |
204 |
Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments
|
Ho, Yao H. |
|
2008 |
89-90 |
12 |
p. 2767-2780 14 p. |
artikel |
205 |
Satisfying demands in a multicellular network: A universal power allocation algorithm
|
Kavitha, Veeraruna |
|
2013 |
89-90 |
12 |
p. 1373-1386 14 p. |
artikel |
206 |
Scheduling algorithms in optical packet switches with input wavelength conversion
|
Eramo, V. |
|
2005 |
89-90 |
12 |
p. 1456-1467 12 p. |
artikel |
207 |
Secure brokerage mechanisms for mobile electronic commerce
|
Esparza, Oscar |
|
2006 |
89-90 |
12 |
p. 2308-2321 14 p. |
artikel |
208 |
Security issues related to mobile code and agent-based systems
|
Oppliger, R |
|
1999 |
89-90 |
12 |
p. 1165-1170 6 p. |
artikel |
209 |
Security Technologies for the World Wide Web
|
Wang, Zhengying |
|
2001 |
89-90 |
12 |
p. 1224- 1 p. |
artikel |
210 |
Signaling in ATM networks; by R. Onvural, R. Cherukuri (Eds.); Artech House, 1997, 334 pages, ISBN 0890068712, ($56.00)
|
Xiang, F |
|
1999 |
89-90 |
12 |
p. 1171-1172 2 p. |
artikel |
211 |
Simulation of three MAC protocols for intelligent highway packet radio networks
|
Marsan, M.Ajmone |
|
1996 |
89-90 |
12 |
p. 943-953 11 p. |
artikel |
212 |
Special Issue of Computer Communications on Heterogeneous Networking for Quality, Reliability, Security, and Robustness – Part-II
|
Hossain, Ekram |
|
2009 |
89-90 |
12 |
p. 1353-1354 2 p. |
artikel |
213 |
SSL/TLS session-aware user authentication – Or how to effectively thwart the man-in-the-middle
|
Oppliger, Rolf |
|
2006 |
89-90 |
12 |
p. 2238-2246 9 p. |
artikel |
214 |
Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol
|
Pountourakis, IE |
|
1995 |
89-90 |
12 |
p. 949-958 10 p. |
artikel |
215 |
Statistical transmission delay guarantee for nonreal-time traffic multiplexed with real-time traffic
|
Albizuri, F.Xabier |
|
2003 |
89-90 |
12 |
p. 1365-1375 11 p. |
artikel |
216 |
Stochastic model and analysis for capacity optimization in communication networks
|
Wu, Jun |
|
2006 |
89-90 |
12 |
p. 2377-2385 9 p. |
artikel |
217 |
Strong on technology and risks
|
de Meer, Jan |
|
1994 |
89-90 |
12 |
p. 889- 1 p. |
artikel |
218 |
Supporting MPEG video VBR traffic in wireless networks
|
Iraqi, Y |
|
2001 |
89-90 |
12 |
p. 1188-1201 14 p. |
artikel |
219 |
Synchronous Digital Hierarchy statistical simulation of pointer activity
|
Owen, Henry |
|
1993 |
89-90 |
12 |
p. 759-766 8 p. |
artikel |
220 |
TCP-Cherry for satellite IP networks: Analytical model and performance evaluation
|
Utsumi, Satoshi |
|
2009 |
89-90 |
12 |
p. 1377-1383 7 p. |
artikel |
221 |
Temporal synchronization support for distributed multimedia information systems
|
Lu, G.J |
|
1994 |
89-90 |
12 |
p. 852-862 11 p. |
artikel |
222 |
Test selection for a nondeterministic FSM
|
Hwang, I. |
|
2001 |
89-90 |
12 |
p. 1213-1223 11 p. |
artikel |
223 |
Test traffic generation equipment and algorithms for evaluating ATM networks
|
Keiser, Gerd |
|
1996 |
89-90 |
12 |
p. 962-971 10 p. |
artikel |
224 |
The directed reverse path join (DRPJ) protocol: an efficient multicast routing protocol
|
Fujinoki, H |
|
2001 |
89-90 |
12 |
p. 1121-1133 13 p. |
artikel |
225 |
The effects of AQM on the performance of Assured Forwarding Service
|
Chang, X. |
|
2006 |
89-90 |
12 |
p. 2294-2307 14 p. |
artikel |
226 |
The ISO virtual terminal protocol: a semi-automatic implementation
|
Lai, R. |
|
1996 |
89-90 |
12 |
p. 990-1000 11 p. |
artikel |
227 |
The issue of useless packet transmission for multimedia over the Internet
|
Wu, Jim |
|
2003 |
89-90 |
12 |
p. 1240-1254 15 p. |
artikel |
228 |
The viral conductance of a network
|
Van Mieghem, Piet |
|
2012 |
89-90 |
12 |
p. 1494-1506 13 p. |
artikel |
229 |
Throughput and energy-aware routing for 802.11 based mesh networks
|
de la Oliva, Antonio |
|
2012 |
89-90 |
12 |
p. 1433-1446 14 p. |
artikel |
230 |
Tool support for hardware/software co-design of communication protocols
|
Fischer, S. |
|
2000 |
89-90 |
12 |
p. 1158-1168 11 p. |
artikel |
231 |
Towards a formal system-to-system authentication protocol
|
Gritzalis, Dimitris |
|
1996 |
89-90 |
12 |
p. 954-961 8 p. |
artikel |
232 |
Traffic profiles and application signatures
|
Mueller, G. |
|
1999 |
89-90 |
12 |
p. 1123-1126 4 p. |
artikel |
233 |
Traffic splitting in a network: split traffic models and applications
|
Ferng, Huei-Wen |
|
2004 |
89-90 |
12 |
p. 1152-1165 14 p. |
artikel |
234 |
Use Case Maps and Lotos for the prototyping and validation of a mobile group call system
|
Amyot, D. |
|
2000 |
89-90 |
12 |
p. 1135-1157 23 p. |
artikel |
235 |
Vehicle tracking in public transport domain and associated spatio-temporal query processing
|
Kane, Lalit |
|
2008 |
89-90 |
12 |
p. 2862-2869 8 p. |
artikel |
236 |
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
|
Boukerche, Azzedine |
|
2008 |
89-90 |
12 |
p. 2838-2849 12 p. |
artikel |
237 |
Verification of security protocols using LOTOS-method and application
|
Leduc, G. |
|
2000 |
89-90 |
12 |
p. 1089-1103 15 p. |
artikel |
238 |
Verifying liveness properties of multifunction composite protocols
|
Park, Jun-Cheol |
|
2003 |
89-90 |
12 |
p. 1318-1329 12 p. |
artikel |
239 |
W-CDMA Mobile Communication Systems
|
Puzmanova, Rita |
|
2003 |
89-90 |
12 |
p. 1427- 1 p. |
artikel |
240 |
Wireless Internet access over GSM and UMTS
|
Puzmanova, Rita |
|
2003 |
89-90 |
12 |
p. 1429-1430 2 p. |
artikel |