Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             113 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ABS: Adaptive buffer sizing for heterogeneous networks Zhang, Yueping
2010
14 p. 2562-2574
13 p.
artikel
2 Achieving effective resilience for QoS-aware application mapping Zhang, Xian
2012
14 p. 3179-3191
13 p.
artikel
3 A cognitive management framework for spectrum selection Bouali, F.
2013
14 p. 2752-2765
14 p.
artikel
4 Adaptive sensing scheduling for cognitive radio systems Jeon, Wha Sook
2012
14 p. 3318-3332
15 p.
artikel
5 A flexible concast-based grouping service Sehgal, Amit
2006
14 p. 2532-2547
16 p.
artikel
6 A generalizable dynamic flow pairing method for traffic classification Camacho, José
2013
14 p. 2718-2732
15 p.
artikel
7 A generic accounting scheme for next generation networks Tsakountakis, Alexandros
2009
14 p. 2408-2426
19 p.
artikel
8 A geographic directed preferential internet topology model Bar, Sagy
2007
14 p. 4174-4188
15 p.
artikel
9 A highly flexible service composition framework for real-life networks Schmid, S.
2006
14 p. 2488-2505
18 p.
artikel
10 A joint network for disaster recovery and search and rescue operations Lakshmi Narayanan, Ram G.
2012
14 p. 3347-3373
27 p.
artikel
11 A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks Huang, Caishi
2012
14 p. 3261-3273
13 p.
artikel
12 A learning automata based scheduling solution to the dynamic point coverage problem in wireless sensor networks Esnaashari, M.
2010
14 p. 2410-2438
29 p.
artikel
13 A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN Sarkar, Mahasweta
2007
14 p. 4005-4031
27 p.
artikel
14 A measurement study on overhead distribution of value-added internet services Gunes, Mehmet H.
2007
14 p. 4153-4173
21 p.
artikel
15 A methodology for testing intersection related Vehicle-2-X applications Röglinger, Sebastian
2011
14 p. 3154-3168
15 p.
artikel
16 An algorithm for privacy-preserving distributed user statistics Tschorsch, Florian
2013
14 p. 2775-2787
13 p.
artikel
17 An efficient scheduling algorithm for scalable video streaming over P2P networks Hua, Kai-Lung
2013
14 p. 2856-2868
13 p.
artikel
18 An experimental study of inter-cell interference effects on system performance in unplanned wireless LAN deployments Ergin, Mesut Ali
2008
14 p. 2728-2744
17 p.
artikel
19 ANQL – An Active Networks Query Language Rogers, Craig Milo
2006
14 p. 2564-2576
13 p.
artikel
20 An underwater acoustic MAC protocol using reverse opportunistic packet appending Ng, Hai-Heng
2013
14 p. 2733-2751
19 p.
artikel
21 A performance analysis of block ACK scheme for IEEE 802.11e networks Lee, Hyewon
2010
14 p. 2468-2481
14 p.
artikel
22 A scalable solution for engineering streaming traffic in the future Internet Baldi, Mario
2007
14 p. 4092-4111
20 p.
artikel
23 AS-level source routing for multi-provider connection-oriented services Secci, Stefano
2010
14 p. 2453-2467
15 p.
artikel
24 A stratified traffic sampling methodology for seeing the big picture Fernandes, Stênio
2008
14 p. 2677-2689
13 p.
artikel
25 A survey of MAC based QoS implementations for WiMAX networks Ahmet Şekercioğlu, Y.
2009
14 p. 2517-2536
20 p.
artikel
26 A switch-based approach to throughput collapse and starvation in data centers Shpiner, Alexander
2012
14 p. 3333-3346
14 p.
artikel
27 A trust model based on fuzzy recommendation for mobile ad-hoc networks Luo, Junhai
2009
14 p. 2396-2407
12 p.
artikel
28 A two-phase approach to interactivity enhancement for large-scale distributed virtual environments Binh Ta, Duong Nguyen
2007
14 p. 4131-4152
22 p.
artikel
29 Building layered active services Singh Dhillon, Chetan
2006
14 p. 2475-2487
13 p.
artikel
30 CLAMP: Efficient class-based sampling for flexible flow monitoring Saxena, Mohit
2010
14 p. 2345-2356
12 p.
artikel
31 Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors Zhang, Pengfei
2013
14 p. 2689-2704
16 p.
artikel
32 Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices Chien, Hung-Yu
2013
14 p. 2705-2717
13 p.
artikel
33 Congestion-aware channel assignment for multi-channel wireless mesh networks Mohsenian Rad, A. Hamed
2009
14 p. 2502-2516
15 p.
artikel
34 Cooperative detection of primary user emulation attacks in CRNs León, Olga
2012
14 p. 3374-3384
11 p.
artikel
35 CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks Khalil, Issa
2012
14 p. 3300-3317
18 p.
artikel
36 Deployment and management of component-based services in active networks Solarski, Marcin
2006
14 p. 2506-2518
13 p.
artikel
37 Development of V-to-X systems in North America: The promise, the pitfalls and the prognosis Misener, James A.
2011
14 p. 3120-3133
14 p.
artikel
38 Double sense multiple access for wireless ad hoc networks Yang, Yang
2007
14 p. 3978-3988
11 p.
artikel
39 Dynamically extending the Corral with native code for high-speed packet processing Bos, Herbert
2006
14 p. 2444-2461
18 p.
artikel
40 Editorial Board 2006
14 p. CO2-
1 p.
artikel
41 Editorial Board 2010
14 p. IFC-
1 p.
artikel
42 Editorial Board 2009
14 p. IFC-
1 p.
artikel
43 Editorial Board 2007
14 p. IFC-
1 p.
artikel
44 Editorial Board 2008
14 p. IFC-
1 p.
artikel
45 Editorial Board 2013
14 p. IFC-
1 p.
artikel
46 Editorial Board 2011
14 p. IFC-
1 p.
artikel
47 Editorial Board 2012
14 p. IFC-
1 p.
artikel
48 Editorial for the Special Issue: Deploying vehicle-2-x communication Herrtwich, R.G.
2011
14 p. 3101-3102
2 p.
artikel
49 Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method Wang, Ze
2013
14 p. 2788-2801
14 p.
artikel
50 Efficient many-to-one authentication with certificateless aggregate signatures Zhang, Lei
2010
14 p. 2482-2491
10 p.
artikel
51 ElisaTM – Car to infrastructure communication in the field Schweiger, Benno
2011
14 p. 3169-3178
10 p.
artikel
52 Error analysis of non-collaborative wireless localization in circular-shaped regions Zhou, Junyi
2010
14 p. 2439-2452
14 p.
artikel
53 Evolutionary algorithms for orthogonal frequency division multiplexing-based dynamic spectrum access systems Ahmadi, H.
2012
14 p. 3206-3218
13 p.
artikel
54 FIB Aplasia through probabilistic routing and autoforwarding Rossini, Giuseppe
2013
14 p. 2802-2816
15 p.
artikel
55 Flexible network monitoring with FLAME Anagnostakis, K.G.
2006
14 p. 2548-2563
16 p.
artikel
56 Game theory for cognitive radio networks: An overview Wang, Beibei
2010
14 p. 2537-2561
25 p.
artikel
57 GRiDA: GReen Distributed Algorithm for energy-efficient IP backbone networks Bianzino, Aruna Prem
2012
14 p. 3219-3232
14 p.
artikel
58 Group multicast routing problem: A genetic algorithms based approach Sanna Randaccio, L.
2007
14 p. 3989-4004
16 p.
artikel
59 Guest Editorial Plattner, Bernhard
2006
14 p. 2421-2425
5 p.
artikel
60 Heuristic algorithms for designing self-repairing protection trees in mesh networks Shah-Heydari, Shahram
2009
14 p. 2537-2551
15 p.
artikel
61 Hierarchical Mobility Label Based Network: System model and performance analysis Berzin, Oleg
2010
14 p. 2357-2382
26 p.
artikel
62 Hose workload based exact algorithm for the optimal design of virtual private networks Diarrassouba, Ibrahima
2013
14 p. 2766-2774
9 p.
artikel
63 Impact of mobility on the performance of relaying in ad hoc networks – Extended version Al Hanbali, A.
2007
14 p. 4112-4130
19 p.
artikel
64 Impact of routing parameters on route diversity and path inflation Mühlbauer, Wolfgang
2010
14 p. 2506-2518
13 p.
artikel
65 Improved layout of the odd–even sorting network Artishchev-Zapolotsky, Maria
2009
14 p. 2387-2395
9 p.
artikel
66 Improving manageability through reorganization of routing-policy configurations Lee, Sihyung
2012
14 p. 3192-3205
14 p.
artikel
67 Incentive-based control of ad hoc networks: A performance study Göbel, Johannes
2009
14 p. 2427-2443
17 p.
artikel
68 Information discovery in mission-critical wireless sensor networks Doss, Robin
2010
14 p. 2383-2399
17 p.
artikel
69 Interactivity vs. fairness in networked Linux systems Wu, Wenji
2007
14 p. 4050-4069
20 p.
artikel
70 Internet traffic modeling by means of Hidden Markov Models Dainotti, Alberto
2008
14 p. 2645-2662
18 p.
artikel
71 LIAD: Adaptive bandwidth prediction based Logarithmic Increase Adaptive Decrease for TCP congestion control in heterogeneous wireless networks Chang, Ben-Jye
2009
14 p. 2566-2585
20 p.
artikel
72 Lightweight thread tunnelling in network applications Donnelly, Austin
2006
14 p. 2462-2474
13 p.
artikel
73 Locating resources in a programmable networking environment Smith, Paul
2006
14 p. 2519-2531
13 p.
artikel
74 Markovian-based traffic modeling for mobile ad hoc networks Calafate, Carlos T.
2009
14 p. 2586-2600
15 p.
artikel
75 Maximizing connected coverage via controlled actor relocation in wireless sensor and actor networks Akkaya, K.
2008
14 p. 2779-2796
18 p.
artikel
76 On the capacity of UWB-based wireless sensor networks Shi, Yi
2008
14 p. 2797-2804
8 p.
artikel
77 On the difficulty of achieving anonymity for Vehicle-2-X communication Troncoso, Carmela
2011
14 p. 3199-3210
12 p.
artikel
78 On the interaction between localization and location verification for wireless sensor networks Al-Abri, Dawood
2008
14 p. 2713-2727
15 p.
artikel
79 On the predictability of large transfer TCP throughput He, Qi
2007
14 p. 3959-3977
19 p.
artikel
80 Optimal algorithms for the batch scheduling problem in OBS networks Figueiredo, Gustavo B.
2012
14 p. 3274-3286
13 p.
artikel
81 Optimal configuration of roadside beacons in V2I communications Vales-Alonso, J.
2011
14 p. 3142-3153
12 p.
artikel
82 Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks Gąsior, Dariusz
2013
14 p. 2817-2832
16 p.
artikel
83 Passive analysis of TCP anomalies Mellia, Marco
2008
14 p. 2663-2676
14 p.
artikel
84 Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments de Cola, Tomaso
2007
14 p. 4032-4049
18 p.
artikel
85 Performance analysis of CSMA/CA protocols with multi-packet transmission Bellalta, B.
2013
14 p. 2675-2688
14 p.
artikel
86 P2P as a CDN: A new service model for file sharing Mondal, Amit
2012
14 p. 3233-3246
14 p.
artikel
87 Privacy leakage on the Web: Diffusion and countermeasures Malandrino, Delfina
2013
14 p. 2833-2855
23 p.
artikel
88 Processing top-k queries from samples Cohen, Edith
2008
14 p. 2605-2622
18 p.
artikel
89 Providing scalable NH-diverse iBGP route re-distribution to achieve sub-second switch-over time Pelsser, Cristel
2010
14 p. 2492-2505
14 p.
artikel
90 REED: Flexible rule based programming of wireless sensor networks at runtime Fei, Xiang
2012
14 p. 3287-3299
13 p.
artikel
91 REFACING: An autonomic approach to network security based on multidimensional trustworthiness Oliviero, F.
2008
14 p. 2745-2763
19 p.
artikel
92 Resilient network admission control Menth, Michael
2008
14 p. 2805-2815
11 p.
artikel
93 Routing in ad-hoc networks with MIMO links: Optimization considerations and protocols Sundaresan, Karthikeyan
2008
14 p. 2623-2644
22 p.
artikel
94 RPL in a nutshell: A survey Gaddour, Olfa
2012
14 p. 3163-3178
16 p.
artikel
95 Simulation of vehicular ad-hoc networks: Challenges, review of tools and recommendations Stanica, Razvan
2011
14 p. 3179-3188
10 p.
artikel
96 SLDRT: A measurement technique for available bandwidth on multi-hop path with bursty cross traffic Hu, Zhiguo
2012
14 p. 3247-3260
14 p.
artikel
97 Small-buffer networks Shifrin, Mark
2009
14 p. 2552-2565
14 p.
artikel
98 Snow on silk: Layering NodeOS functionality on conventional operating systems Shalaby, Nadia
2006
14 p. 2426-2443
18 p.
artikel
99 SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery Rakotoarivelo, Thierry
2007
14 p. 4189-4211
23 p.
artikel
100 Spectrum sharing in cognitive radio networks with imperfect sensing: A discrete-time Markov model Gelabert, Xavier
2010
14 p. 2519-2536
18 p.
artikel
101 Support for resilient Peer-to-Peer gaming Norden, Samphel
2007
14 p. 4212-4233
22 p.
artikel
102 Support Vector Machines for TCP traffic classification Este, Alice
2009
14 p. 2476-2490
15 p.
artikel
103 TARP: A traffic-aware restructuring protocol for Bluetooth radio networks Chang, Chih-Yung
2007
14 p. 4070-4091
22 p.
artikel
104 TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Marfia, Gustavo
2010
14 p. 2327-2344
18 p.
artikel
105 The changing usage of a mature campus-wide wireless network Henderson, Tristan
2008
14 p. 2690-2712
23 p.
artikel
106 The choice of the best among the shortest routes in transparent optical networks Durães, Gilvan M.
2010
14 p. 2400-2409
10 p.
artikel
107 The latest trend of v2x driver assistance systems in Japan Fukushima, Masao
2011
14 p. 3134-3141
8 p.
artikel
108 TMCP: Two-layer multicast communication protocol for Bluetooth radio networks Chang, Chao-Tsun
2008
14 p. 2764-2778
15 p.
artikel
109 Traffic monitor deployment in IP networks Zang, Hui
2009
14 p. 2491-2501
11 p.
artikel
110 Transport-independent fairness Behsaz, B.
2009
14 p. 2444-2457
14 p.
artikel
111 Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks Xiao, Yang
2009
14 p. 2458-2475
18 p.
artikel
112 V2X communication in Europe – From research projects towards standardization and field testing of vehicle communication technology Weiß, Christian
2011
14 p. 3103-3119
17 p.
artikel
113 V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems Schünemann, Björn
2011
14 p. 3189-3198
10 p.
artikel
                             113 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland