Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             240 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access protection solution for heavy load unfairness in DQDB Kumar, Lakshmana N
1995
89-90 12 p. 896-910
15 p.
artikel
2 A computer aided tool for the performance evaluation of next generation WDM wavelength-routed optical networks Eshoul, Abdelhamid E
2004
89-90 12 p. 1197-1205
9 p.
artikel
3 Addressing the requirements of QoS management for wireless ad hoc networks☆ Phanse, Kaustubh S
2003
89-90 12 p. 1263-1273
11 p.
artikel
4 A distortion-minimizing rate controller for wireless multimedia sensor networks Pudlewski, Scott
2010
89-90 12 p. 1380-1390
11 p.
artikel
5 Advances in computer communications Obaidat, Mohammad S.
2004
89-90 12 p. 1127-1130
4 p.
artikel
6 A flexible contention resolution scheme for QoS provisioning in optical burst switching networks Turuk, Ashok K.
2006
89-90 12 p. 2361-2376
16 p.
artikel
7 A formalisation and evaluation of certificate policies Klobučar, T
1999
89-90 12 p. 1104-1110
7 p.
artikel
8 A framework for allocating clients to rate-constrained multicast servers Fei, Zongming
2003
89-90 12 p. 1255-1262
8 p.
artikel
9 A ∑GI i /D/1/∞ queue with heterogeneous input/output slot times Yihong, L.
1999
89-90 12 p. 1136-1149
14 p.
artikel
10 A high speed scheduler/controller for unbuffered banyan networks Salisbury, C
2001
89-90 12 p. 1158-1169
12 p.
artikel
11 Algebraic connectivity metric for spare capacity allocation problem in survivable networks Liu, William
2011
89-90 12 p. 1425-1435
11 p.
artikel
12 A MAC protocol for HFC networks: Design issues and performance evaluation Golmie, Nada
1997
89-90 12 p. 1042-1050
9 p.
artikel
13 A mechanism to enforce privacy in vehicle-to-infrastructure communication Cencioni, Paolo
2008
89-90 12 p. 2790-2802
13 p.
artikel
14 A method for multiple channel recovery in TDMA wireless communications systems Ma, Y
2001
89-90 12 p. 1147-1157
11 p.
artikel
15 A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications Karamad, Ehsan
2008
89-90 12 p. 2898-2906
9 p.
artikel
16 A modular methodology to verify communication protocols Peng, Wuxu
1997
89-90 12 p. 1069-1077
9 p.
artikel
17 An adaptive multirate congestion control protocol for multicast communications Rodríguez Pérez, M.
2006
89-90 12 p. 2247-2260
14 p.
artikel
18 An adaptive protocol for real-time fax communications over Internet Yeo, C.K
2001
89-90 12 p. 1134-1146
13 p.
artikel
19 An adaptive protocol model for IEEE 802.11 wireless LANs Obaidat, M.S
2004
89-90 12 p. 1131-1136
6 p.
artikel
20 Analysis of an access node multiplexer in a system serving CBR and VBR traffic Habibi, Daryoush
1993
89-90 12 p. 776-780
5 p.
artikel
21 An ATM service architecture for the transport of adaptively encoded live video Vickers, Brett J.
1997
89-90 12 p. 1078-1088
11 p.
artikel
22 An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks Sardana, Anjali
2009
89-90 12 p. 1384-1399
16 p.
artikel
23 An efficient parallel optimization algorithm for the Token Bucket control mechanism Ahmed, N.U.
2006
89-90 12 p. 2281-2293
13 p.
artikel
24 An efficient preemption-based channel scheduling algorithm for service differentiation in OBS networks Kim, Byung-Chul
2006
89-90 12 p. 2348-2360
13 p.
artikel
25 An empirical study of TCP/IP performance over ATM 1 This paper was also presented at the Transport Protocols for High Speed Broadband Networks Workshop, at Globecom'96, in Westminster, London, UK, on 22 November, 1996. 1 Sebüktekin, Isıl
1998
89-90 12 p. 1058-1069
12 p.
artikel
26 An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks Zhao, Y.Z.
2010
89-90 12 p. 1452-1461
10 p.
artikel
27 A non-cooperative game approach for power-aware MAC in ad hoc wireless networks Ghasemi, Abdorasoul
2010
89-90 12 p. 1440-1451
12 p.
artikel
28 An optimization-oriented view of random early detection Aweya, J
2001
89-90 12 p. 1170-1187
18 p.
artikel
29 A novel secure communication scheme in vehicular ad hoc networks Wang, Neng-Wen
2008
89-90 12 p. 2827-2837
11 p.
artikel
30 A novel SVC mechanism for call connection and control in ATM networks Henry, Robert R.
1997
89-90 12 p. 1123-1128
6 p.
artikel
31 An overview of anonymity technology usage Li, Bingdong
2013
89-90 12 p. 1269-1283
15 p.
artikel
32 A performance anomaly in clustered on-line transaction processing systems Cai, Hong
2004
89-90 12 p. 1166-1173
8 p.
artikel
33 A performance comparison of self-organising application layer multicast overlay construction techniques Tan, Su-Wei
2006
89-90 12 p. 2322-2347
26 p.
artikel
34 Application of online-training SVMs for real-time intrusion detection with different considerations Zhang, Zonghua
2005
89-90 12 p. 1428-1442
15 p.
artikel
35 Applying formal description techniques to software architectural design Li, J.J
2000
89-90 12 p. 1169-1178
10 p.
artikel
36 A pricing method for elastic services that guarantees the GoS in a scenario of evolutionary demand Postigo-Boix, Marcos
2013
89-90 12 p. 1317-1328
12 p.
artikel
37 A QoS-aware policer for a fair resource sharing in wireless ATM Fantacci, Romano
2003
89-90 12 p. 1392-1404
13 p.
artikel
38 A quasi-static retrieval scheme for interactive VOD servers Sengodan, Senthil
1997
89-90 12 p. 1031-1041
11 p.
artikel
39 Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks Santa, José
2008
89-90 12 p. 2850-2861
12 p.
artikel
40 A real-time multicast routing algorithm for multimedia applications Jia, Xiaohua
1997
89-90 12 p. 1098-1106
9 p.
artikel
41 A scalable method for DCLC problem using hierarchical MDP model Han, Yue
2013
89-90 12 p. 1310-1316
7 p.
artikel
42 A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks Li, Chun-Ta
2008
89-90 12 p. 2803-2814
12 p.
artikel
43 A stochastic model for beaconless IEEE 802.15.4 MAC operation Goyal, M.
2011
89-90 12 p. 1460-1474
15 p.
artikel
44 A Stop-or-Move Mobility model for PCS networks and its location-tracking strategies Tseng, Yu-Chee
2003
89-90 12 p. 1288-1301
14 p.
artikel
45 A success story of formal description techniques: Estelle specification and test generation for MIL-STD 188-220 Fecko, M.A.
2000
89-90 12 p. 1196-1213
18 p.
artikel
46 Asynchronous reservation protocol for variable-sized messages in a WDM-based local network Lee, Jae Hwoon
1995
89-90 12 p. 880-888
9 p.
artikel
47 ATM-over-satellite demonstration of broadband network interconnection Sun, Z
1998
89-90 12 p. 1090-1101
12 p.
artikel
48 ATM traffic transfer via queued-arbitrated DQDB Venieris, IS
1993
89-90 12 p. 746-758
13 p.
artikel
49 A topology discovery algorithm for sensor network using smart antennas Khedr, Ahmed M.
2006
89-90 12 p. 2261-2268
8 p.
artikel
50 A transport protocol for native mode ATM networks design and implementation Karabek, Raschid
1998
89-90 12 p. 1080-1089
10 p.
artikel
51 Author biographies 1995
89-90 12 p. 997-1001
5 p.
artikel
52 Author biographies 1994
89-90 12 p. 886-888
3 p.
artikel
53 Author biographies 1993
89-90 12 p. 806-807
2 p.
artikel
54 A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks Zhao, Yanxiao
2011
89-90 12 p. 1510-1517
8 p.
artikel
55 Bandwidth-demand prediction in virtual path in ATM networks using genetic algorithms Swaminathan, N.
1999
89-90 12 p. 1127-1135
9 p.
artikel
56 BLAST: broadband lightweight ATM secure transport for high-performance distributed computing Dowd, Patrick W
1998
89-90 12 p. 1040-1057
18 p.
artikel
57 Broadband Access Network; by L.A. Ims; Chapman and Hall, 1998, 370 pages, ISBN 0412828200 (£90.00) Xiang, F
1999
89-90 12 p. 1171-
1 p.
artikel
58 Building and managing virtual private network; by D. Kosiur; Wiley, New York, USA, 400 pages, ISBN 0471-295264 (£29.50) Lo, C.-C
1999
89-90 12 p. 1173-
1 p.
artikel
59 Calendar 1996
89-90 12 p. 1020-1023
4 p.
artikel
60 Calendar 1997
89-90 12 p. 1129-1131
3 p.
artikel
61 Calendar 1995
89-90 12 p. 1003-1006
4 p.
artikel
62 Calendar 1993
89-90 12 p. 809-810
2 p.
artikel
63 Call For Papers: Foundations of Peer to peer Computing 2006
89-90 12 p. II-
1 p.
artikel
64 Call for Papers: Optical Networking: Systems and Protocols 2006
89-90 12 p. I-
1 p.
artikel
65 Capacity assignment in computer communication networks with unreliable links Saha, Debashis
1994
89-90 12 p. 871-875
5 p.
artikel
66 Class-based downlink capacity estimation of a WCDMA network in a multiservice context Dou, Chie
2005
89-90 12 p. 1443-1455
13 p.
artikel
67 Collection of on-going work Schoo, Peter
1994
89-90 12 p. 889-890
2 p.
artikel
68 Conference key distribution schemes for portable communication systems Chang, C.-C
1999
89-90 12 p. 1160-1164
5 p.
artikel
69 Congestion control based dynamic routing in ATM networks Bahk, Saewoong
1994
89-90 12 p. 826-835
10 p.
artikel
70 Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks Misra, Sudip
2011
89-90 12 p. 1484-1496
13 p.
artikel
71 Construction of checking sequences based on characterization sets Rezaki, Ali
1995
89-90 12 p. 911-920
10 p.
artikel
72 Cooperative security in distributed networks Garcia-Morchon, Oscar
2013
89-90 12 p. 1284-1297
14 p.
artikel
73 Corrigendum to “SNMP information based routing mechanism for fast handoff in mobile IP” [Computer Communications 28 (2005) 1887–1902] Ryu, Sang-Hoon
2006
89-90 12 p. 2446-
1 p.
artikel
74 CPSCox: A survival analysis model of peer behavior in large scale DHT system Huang, Daochao
2012
89-90 12 p. 1484-1493
10 p.
artikel
75 Cross-layer rate control, medium access control and routing design in cooperative VANET Zhou, Liang
2008
89-90 12 p. 2870-2882
13 p.
artikel
76 Design, analysis, and evaluation of an improved scheme for ATM burst-level admission control Moh, W.Melody
1997
89-90 12 p. 1107-1122
16 p.
artikel
77 Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees Cho, K.-H.
1999
89-90 12 p. 1150-1159
10 p.
artikel
78 Design and evaluation of feedback consolidation for ABR point-to-multipoint connections in ATM networks Fahmy, S.
1999
89-90 12 p. 1085-1103
19 p.
artikel
79 Design and implementation of electronic toll collection system based on vehicle positioning system techniques Lee, Wei-Hsun
2008
89-90 12 p. 2925-2933
9 p.
artikel
80 Design and performance analysis of an inductive QoS routing algorithm Mellouk, Abdelhamid
2009
89-90 12 p. 1371-1376
6 p.
artikel
81 Design a novel fairness model in WiMAX mesh networks Wang, Hanwu
2012
89-90 12 p. 1447-1456
10 p.
artikel
82 Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks Qing, Li
2006
89-90 12 p. 2230-2237
8 p.
artikel
83 Design of new real-time models for tight upper bound approximation of cell loss ratio in ATM networks Haghighat, A.T.
2003
89-90 12 p. 1225-1239
15 p.
artikel
84 Design of universal personal computing using SDL Törö, M
2000
89-90 12 p. 1124-1134
11 p.
artikel
85 Design, optimization and performance evaluation of a content distribution overlay for streaming Caviglione, Luca
2011
89-90 12 p. 1497-1509
13 p.
artikel
86 Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks Ejaz, Waleed
2013
89-90 12 p. 1341-1349
9 p.
artikel
87 Distributed packet pairing for reflector based DDoS attack mitigation Al-Duwairi, Basheer
2006
89-90 12 p. 2269-2280
12 p.
artikel
88 Distributed path finding algorithm for stream multicast Xiaofeng Jiang,
1993
89-90 12 p. 767-775
9 p.
artikel
89 Dynamic location strategy for hot mobile subscribers in personal communications Lin, Hwa-Chuan
2003
89-90 12 p. 1353-1364
12 p.
artikel
90 Dynamic robust power allocation games under channel uncertainty and time delays Tembine, Hamidou
2011
89-90 12 p. 1529-1537
9 p.
artikel
91 EDIpro — an integrated environment for electronic data interchange Zazula, Damjan
1994
89-90 12 p. 876-885
10 p.
artikel
92 Editorial 1998
89-90 12 p. 1039-
1 p.
artikel
93 Editorial Board 2004
89-90 12 p. IFC-
1 p.
artikel
94 Editorial Board 2008
89-90 12 p. IFC-
1 p.
artikel
95 Editorial Board 2003
89-90 12 p. IFC-
1 p.
artikel
96 Effect of capture on throughput of variable length packet Aloha systems Clark Robertson, R
1994
89-90 12 p. 836-842
7 p.
artikel
97 Effect of fault tolerance and communication delay on response time in a multiprocessor system with a bus topology Bataineh, Sameer
1994
89-90 12 p. 843-851
9 p.
artikel
98 Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol de Fez, Ismael
2013
89-90 12 p. 1298-1309
12 p.
artikel
99 Effects of node processing time on optimal load balancing in tree hierarchy network configurations Jie Li,
1993
89-90 12 p. 781-793
13 p.
artikel
100 Efficient nearer-ancestor algorithm for network routing Lam, Kwok-Yan
1996
89-90 12 p. 1014-1019
6 p.
artikel
101 Erratum to “Scalability and traffic control in IP networks” [Editorial of Special Issue 26 (2003) 203] Fahmy, Sonia
2003
89-90 12 p. 1432-
1 p.
artikel
102 Ethernet networks Weik, Hartmut
2003
89-90 12 p. 1426-
1 p.
artikel
103 EuQoS: End-to-End Quality of Service over Heterogeneous Networks Mingozzi, E.
2009
89-90 12 p. 1355-1370
16 p.
artikel
104 Experience with RT-LOTOS, a temporal extension of the LOTOS formal description technique Courtiat, J.-P.
2000
89-90 12 p. 1104-1123
20 p.
artikel
105 Explicit routing in multicast overlay networks Braun, Torsten
2006
89-90 12 p. 2201-2216
16 p.
artikel
106 Exploiting the temporal dimension in QoS-aware multicast routing Tseng, C.J.
2003
89-90 12 p. 1274-1287
14 p.
artikel
107 Feature selection for optimizing traffic classification Zhang, Hongli
2012
89-90 12 p. 1457-1471
15 p.
artikel
108 File recovery by ISO FTAM Poo, Gee-Swee
1993
89-90 12 p. 798-805
8 p.
artikel
109 Firewalls in an OSI-environment Berge, Nils Harald
1996
89-90 12 p. 982-989
8 p.
artikel
110 Formal description of distributed multimedia systems: an assessment of potential techniques Bowman, Howard
1995
89-90 12 p. 964-977
14 p.
artikel
111 Formal language for security services base modelling and analysis Trček, Denis
1995
89-90 12 p. 921-928
8 p.
artikel
112 Frame-counter scheduler: A novel QoS scheduler for real-time traffic (Guran) Schmidt, S. Ece
2006
89-90 12 p. 2181-2200
20 p.
artikel
113 GLP: A cryptographic approach for group location privacy Ashouri-Talouki, Maede
2012
89-90 12 p. 1527-1533
7 p.
artikel
114 Graceful degradation of loss-tolerant QoS using (m,k)-firm constraints in guaranteed rate networks Koubâa, Anis
2005
89-90 12 p. 1393-1409
17 p.
artikel
115 Hierarchical distributed data classification in wireless sensor networks Cheng, Xu
2010
89-90 12 p. 1404-1413
10 p.
artikel
116 ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer Chen, Yung-Hsiang
1995
89-90 12 p. 993-996
4 p.
artikel
117 IFC - Editorial Board 2010
89-90 12 p. IFC-
1 p.
artikel
118 IFC - Editorial Board 2009
89-90 12 p. IFC-
1 p.
artikel
119 IFC Editorial Board 2006
89-90 12 p. CO2-
1 p.
artikel
120 IFC - Editorial Board 2013
89-90 12 p. IFC-
1 p.
artikel
121 IFC - Editorial Board 2011
89-90 12 p. IFC-
1 p.
artikel
122 IFC - Editorial Board 2012
89-90 12 p. IFC-
1 p.
artikel
123 IFC Editorial Board - top half 2005
89-90 12 p. co2-
1 p.
artikel
124 Improving the efficiency of automated protocol implementations using a configurable FDT compiler Koenig, H
2000
89-90 12 p. 1179-1195
17 p.
artikel
125 Incorporating priority scheme in IPv6 over ATM networks Zhang, L
1999
89-90 12 p. 1111-1122
12 p.
artikel
126 Index to volume 18 (1995) 1995
89-90 12 p. 1007-1012
6 p.
artikel
127 Index to volume 17 (1994) 1994
89-90 12 p. 891-896
6 p.
artikel
128 Index to Volume 16 (1993) 1993
89-90 12 p. 811-816
6 p.
artikel
129 Inefficiency of MaxWeight scheduling in spatial wireless networks van de Ven, P.M.
2013
89-90 12 p. 1350-1359
10 p.
artikel
130 Intelligent Broadband Networks; by I. Venieris, H. Hussmann; Wiley, New York, 330 pages, ISBN 0471980943, £50.00 Zhang, L
1999
89-90 12 p. 1173-
1 p.
artikel
131 Interconnection network front-end controller combining to reduce hot spots effects Sharif, Hamid
1997
89-90 12 p. 1089-1097
9 p.
artikel
132 Interference and power constrained broadcast and multicast routing in wireless ad hoc networks using directional antennas Li, Zheng
2010
89-90 12 p. 1428-1439
12 p.
artikel
133 Interference Aware-based Ad-Hoc On Demand Distance Vector (IA-AODV) ultra wideband system routing protocol De Rango, Floriano
2011
89-90 12 p. 1475-1483
9 p.
artikel
134 Interference-aware channel assignment in a metropolitan multi-radio wireless mesh network with directional antennas Siris, Vasilios A.
2011
89-90 12 p. 1518-1528
11 p.
artikel
135 Internet Communications Using SIP Weik, Hartmut
2003
89-90 12 p. 1428-
1 p.
artikel
136 Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks Blough, Douglas
2010
89-90 12 p. 1369-
1 p.
artikel
137 Intrusion detection through learning behavior model Balajinath, B
2001
89-90 12 p. 1202-1212
11 p.
artikel
138 IP Telephony with H.323: Architectures for Unified Networks and Integrated Services Puzmanova, Rita
2003
89-90 12 p. 1431-
1 p.
artikel
139 JPEG based scalable image compression Panchanathan, S.
1996
89-90 12 p. 1001-1013
13 p.
artikel
140 Kinetic mobility management applied to vehicular ad hoc network protocols Härri, Jérôme
2008
89-90 12 p. 2907-2924
18 p.
artikel
141 Level the buffer wall: Fair channel assignment in wireless sensor networks Yang, Yanyan
2010
89-90 12 p. 1370-1379
10 p.
artikel
142 Measuring long-term location privacy in vehicular communication systems Ma, Zhendong
2010
89-90 12 p. 1414-1427
14 p.
artikel
143 Measuring web feature impacts in Peer-to-Peer file sharing systems Yang, Sirui
2009
89-90 12 p. 1418-1425
8 p.
artikel
144 M|G|1 priority scheduling with discrete pre-emption points: on the impacts of fragmentation on IP QoS Fidler, Markus
2004
89-90 12 p. 1183-1196
14 p.
artikel
145 Mobility protocols for ITS/VANET Chao, Han-Chieh
2008
89-90 12 p. 2765-2766
2 p.
artikel
146 Modeling and analysis of PC-based software routers Salah, K.
2010
89-90 12 p. 1462-1470
9 p.
artikel
147 Modeling and optimization of survivable P2P multicasting Walkowiak, Krzysztof
2011
89-90 12 p. 1410-1424
15 p.
artikel
148 Modeling location management in wireless networks with generally distributed parameters Zhang, Yan
2006
89-90 12 p. 2386-2395
10 p.
artikel
149 Modified distributed snapshots algorithm for protocol stabilization Saleh, Kassem
1994
89-90 12 p. 863-870
8 p.
artikel
150 Modular multicast ATM switching architecture Liaw, Ji-Horng
1995
89-90 12 p. 929-935
7 p.
artikel
151 Multiple connections in data communication and advanced applications Boudriga, Nuoureddine
1997
89-90 12 p. 1051-1058
8 p.
artikel
152 Network access protocol for hard real-time communication systems Ulusoy, Özgür
1995
89-90 12 p. 943-948
6 p.
artikel
153 [No title] Lai, R
2000
89-90 12 p. 1087-1088
2 p.
artikel
154 OBC - Contents 2006
89-90 12 p. CO4-
1 p.
artikel
155 OBC - Contents 2005
89-90 12 p. co4-
1 p.
artikel
156 ODA implementation for multimedia teleservices Baier, R
1995
89-90 12 p. 889-895
7 p.
artikel
157 Off-line incentive mechanism for long-term P2P backup storage Gramaglia, Marco
2012
89-90 12 p. 1516-1526
11 p.
artikel
158 On accuracy of region based localization algorithms for wireless sensor networks Zhang, Shigeng
2010
89-90 12 p. 1391-1403
13 p.
artikel
159 On content delivery network implementation Molina Moreno, B.
2006
89-90 12 p. 2396-2412
17 p.
artikel
160 Online NetFPGA decision tree statistical traffic classifier Monemi, Alireza
2013
89-90 12 p. 1329-1340
12 p.
artikel
161 On the dynamic allocation of resources using linear prediction of aggregate network traffic López-Guerrero, Miguel
2003
89-90 12 p. 1341-1352
12 p.
artikel
162 On the effectiveness of the many-sources asymptotic for admission control Fernández-Veiga, M.
2003
89-90 12 p. 1376-1391
16 p.
artikel
163 On the security of Wu and Yeh's conference key distribution system Hwang, Tzonelih
1995
89-90 12 p. 978-981
4 p.
artikel
164 On the use of adaptive grouping protocols under asymmetric bursty traffic Papadimitriou, Georgios I
2004
89-90 12 p. 1137-1142
6 p.
artikel
165 On the use of out-of-band signaling in ad hoc wireless networks Manoj, B.S
2003
89-90 12 p. 1405-1414
10 p.
artikel
166 Optical nonlinear effects on the performance of IP traffic over GMPLS-based DWDM networks Tang, Junhua
2003
89-90 12 p. 1330-1340
11 p.
artikel
167 Optimal placement of multicast and wavelength converting nodes in multicast optical virtual private network Yong, Keen-Mun
2006
89-90 12 p. 2169-2180
12 p.
artikel
168 Optimal setup of interference threshold in a multi-cell WCDMA environment Kim, Jae-Hoon
2003
89-90 12 p. 1415-1418
4 p.
artikel
169 Optimal transmission schemes for parallel and fading Gaussian broadcast channels with an energy harvesting rechargeable transmitter Ozel, Omur
2013
89-90 12 p. 1360-1372
13 p.
artikel
170 Overload control in SIP networks using no explicit feedback: A window based approach Azhari, Seyed Vahid
2012
89-90 12 p. 1472-1483
12 p.
artikel
171 Packet-based scheduling algorithm for CIOQ switches with multiple traffic classes Lee, Tsern-Huei
2005
89-90 12 p. 1410-1415
6 p.
artikel
172 PCPGSD: An enhanced GSD service discovery protocol for MANETs Gao, Zhenguo
2006
89-90 12 p. 2433-2445
13 p.
artikel
173 p-Cycle protection at the glass fiber level Onguetou, Diane Prisca
2011
89-90 12 p. 1399-1409
11 p.
artikel
174 Performance analysis of session initiation protocol based call set-up over satellite-UMTS network Kueh, Victor Y.H.
2005
89-90 12 p. 1416-1427
12 p.
artikel
175 Performance evaluation of a generalized hybrid TDMA/CDMA protocol for wireless multimedia with QoS adaptations Boukerche, Azzedine
2005
89-90 12 p. 1468-1480
13 p.
artikel
176 Performance evaluation of subflow capable SCTP Zou, Jianping
2006
89-90 12 p. 2413-2432
20 p.
artikel
177 Performance of Bluetooth bridge scheduling algorithms Mišić, Jelena
2004
89-90 12 p. 1143-1151
9 p.
artikel
178 Performance of dilated banyan network with back-pressure mechanism Youn, Young Sik
1996
89-90 12 p. 972-981
10 p.
artikel
179 Performance of PRMA in a mobile radio channel Chua, KC
1995
89-90 12 p. 982-987
6 p.
artikel
180 Performance of TCP over UBR in ATM with EPD and virtual queuing techniques Tzeng, Hong-Yi
1998
89-90 12 p. 1070-1079
10 p.
artikel
181 Performance study of buffer management schemes under multicasting traffic in ATM switching nodes Sheta, Khalid H.
1997
89-90 12 p. 1059-1068
10 p.
artikel
182 PFC: A packet forwarding control scheme for vehicle handover over the ITS networks Huang, Chung-Ming
2008
89-90 12 p. 2815-2826
12 p.
artikel
183 PoX: Protecting users from malicious Facebook applications Egele, Manuel
2012
89-90 12 p. 1507-1515
9 p.
artikel
184 Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS Kousalya, G.
2008
89-90 12 p. 2781-2789
9 p.
artikel
185 Priority shaping of source traffic in ATM B-ISDN Reiss, Leszek K
1993
89-90 12 p. 794-797
4 p.
artikel
186 Proactive resource provisioning Chi, Eric
2004
89-90 12 p. 1174-1182
9 p.
artikel
187 Protection performance components in MPLS networks Calle, Eusebi
2004
89-90 12 p. 1220-1228
9 p.
artikel
188 Providing resiliency for optical grids by exploiting relocation: A dimensioning study based on ILP Buysse, J.
2011
89-90 12 p. 1389-1398
10 p.
artikel
189 Providing VANET security through active position detection Yan, Gongjun
2008
89-90 12 p. 2883-2897
15 p.
artikel
190 QoS multicast routing for multimedia group communications using intelligent computational methods Wang, Xingwei
2006
89-90 12 p. 2217-2229
13 p.
artikel
191 QoS-sensitive admission policy for non-real-time data packets in voice/data integrated CDMA systems Koo, Insoo
2003
89-90 12 p. 1419-1425
7 p.
artikel
192 Quorum based sink location service for irregular wireless sensor networks Yu, Fucai
2012
89-90 12 p. 1422-1432
11 p.
artikel
193 Reactive firewalls—a new technique Hunt, Ray
2003
89-90 12 p. 1302-1317
16 p.
artikel
194 Real-time applications in a CRMA network: a performance analysis Anastasi, G
1995
89-90 12 p. 871-879
9 p.
artikel
195 Relational-based calculus for trust management in networked services Guemara-ElFatmi, Sihem
2004
89-90 12 p. 1206-1219
14 p.
artikel
196 Remote login authentication scheme based on a geometric approach Wu, Tzong-Chen
1995
89-90 12 p. 959-963
5 p.
artikel
197 Remote scheme for password authentication based on theory of quadratic residues Chang, Chin-Chen
1995
89-90 12 p. 936-942
7 p.
artikel
198 Replay tolerance of authentication protocols Lam, Kwok-Yan
1995
89-90 12 p. 988-992
5 p.
artikel
199 Reputation management algorithms for DHT-based peer-to-peer environment Fedotova, Natalya
2009
89-90 12 p. 1400-1409
10 p.
artikel
200 Request-driven swarming scheme for P2P data streaming Xu, Jialing
2009
89-90 12 p. 1410-1417
8 p.
artikel
201 Rerouting in advance reservation networks Xie, Chongyang
2012
89-90 12 p. 1411-1421
11 p.
artikel
202 Restoration in multi-domain GMPLS-based networks Manolova, Anna
2011
89-90 12 p. 1450-1459
10 p.
artikel
203 Robust network planning in nonuniform traffic scenarios Tizghadam, Ali
2011
89-90 12 p. 1436-1449
14 p.
artikel
204 Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments Ho, Yao H.
2008
89-90 12 p. 2767-2780
14 p.
artikel
205 Satisfying demands in a multicellular network: A universal power allocation algorithm Kavitha, Veeraruna
2013
89-90 12 p. 1373-1386
14 p.
artikel
206 Scheduling algorithms in optical packet switches with input wavelength conversion Eramo, V.
2005
89-90 12 p. 1456-1467
12 p.
artikel
207 Secure brokerage mechanisms for mobile electronic commerce Esparza, Oscar
2006
89-90 12 p. 2308-2321
14 p.
artikel
208 Security issues related to mobile code and agent-based systems Oppliger, R
1999
89-90 12 p. 1165-1170
6 p.
artikel
209 Security Technologies for the World Wide Web Wang, Zhengying
2001
89-90 12 p. 1224-
1 p.
artikel
210 Signaling in ATM networks; by R. Onvural, R. Cherukuri (Eds.); Artech House, 1997, 334 pages, ISBN 0890068712, ($56.00) Xiang, F
1999
89-90 12 p. 1171-1172
2 p.
artikel
211 Simulation of three MAC protocols for intelligent highway packet radio networks Marsan, M.Ajmone
1996
89-90 12 p. 943-953
11 p.
artikel
212 Special Issue of Computer Communications on Heterogeneous Networking for Quality, Reliability, Security, and Robustness – Part-II Hossain, Ekram
2009
89-90 12 p. 1353-1354
2 p.
artikel
213 SSL/TLS session-aware user authentication – Or how to effectively thwart the man-in-the-middle Oppliger, Rolf
2006
89-90 12 p. 2238-2246
9 p.
artikel
214 Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol Pountourakis, IE
1995
89-90 12 p. 949-958
10 p.
artikel
215 Statistical transmission delay guarantee for nonreal-time traffic multiplexed with real-time traffic Albizuri, F.Xabier
2003
89-90 12 p. 1365-1375
11 p.
artikel
216 Stochastic model and analysis for capacity optimization in communication networks Wu, Jun
2006
89-90 12 p. 2377-2385
9 p.
artikel
217 Strong on technology and risks de Meer, Jan
1994
89-90 12 p. 889-
1 p.
artikel
218 Supporting MPEG video VBR traffic in wireless networks Iraqi, Y
2001
89-90 12 p. 1188-1201
14 p.
artikel
219 Synchronous Digital Hierarchy statistical simulation of pointer activity Owen, Henry
1993
89-90 12 p. 759-766
8 p.
artikel
220 TCP-Cherry for satellite IP networks: Analytical model and performance evaluation Utsumi, Satoshi
2009
89-90 12 p. 1377-1383
7 p.
artikel
221 Temporal synchronization support for distributed multimedia information systems Lu, G.J
1994
89-90 12 p. 852-862
11 p.
artikel
222 Test selection for a nondeterministic FSM Hwang, I.
2001
89-90 12 p. 1213-1223
11 p.
artikel
223 Test traffic generation equipment and algorithms for evaluating ATM networks Keiser, Gerd
1996
89-90 12 p. 962-971
10 p.
artikel
224 The directed reverse path join (DRPJ) protocol: an efficient multicast routing protocol Fujinoki, H
2001
89-90 12 p. 1121-1133
13 p.
artikel
225 The effects of AQM on the performance of Assured Forwarding Service Chang, X.
2006
89-90 12 p. 2294-2307
14 p.
artikel
226 The ISO virtual terminal protocol: a semi-automatic implementation Lai, R.
1996
89-90 12 p. 990-1000
11 p.
artikel
227 The issue of useless packet transmission for multimedia over the Internet Wu, Jim
2003
89-90 12 p. 1240-1254
15 p.
artikel
228 The viral conductance of a network Van Mieghem, Piet
2012
89-90 12 p. 1494-1506
13 p.
artikel
229 Throughput and energy-aware routing for 802.11 based mesh networks de la Oliva, Antonio
2012
89-90 12 p. 1433-1446
14 p.
artikel
230 Tool support for hardware/software co-design of communication protocols Fischer, S.
2000
89-90 12 p. 1158-1168
11 p.
artikel
231 Towards a formal system-to-system authentication protocol Gritzalis, Dimitris
1996
89-90 12 p. 954-961
8 p.
artikel
232 Traffic profiles and application signatures Mueller, G.
1999
89-90 12 p. 1123-1126
4 p.
artikel
233 Traffic splitting in a network: split traffic models and applications Ferng, Huei-Wen
2004
89-90 12 p. 1152-1165
14 p.
artikel
234 Use Case Maps and Lotos for the prototyping and validation of a mobile group call system Amyot, D.
2000
89-90 12 p. 1135-1157
23 p.
artikel
235 Vehicle tracking in public transport domain and associated spatio-temporal query processing Kane, Lalit
2008
89-90 12 p. 2862-2869
8 p.
artikel
236 Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems Boukerche, Azzedine
2008
89-90 12 p. 2838-2849
12 p.
artikel
237 Verification of security protocols using LOTOS-method and application Leduc, G.
2000
89-90 12 p. 1089-1103
15 p.
artikel
238 Verifying liveness properties of multifunction composite protocols Park, Jun-Cheol
2003
89-90 12 p. 1318-1329
12 p.
artikel
239 W-CDMA Mobile Communication Systems Puzmanova, Rita
2003
89-90 12 p. 1427-
1 p.
artikel
240 Wireless Internet access over GSM and UMTS Puzmanova, Rita
2003
89-90 12 p. 1429-1430
2 p.
artikel
                             240 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland