nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ABS: Adaptive buffer sizing for heterogeneous networks
|
Zhang, Yueping |
|
2010 |
|
14 |
p. 2562-2574 13 p. |
artikel |
2 |
Achieving effective resilience for QoS-aware application mapping
|
Zhang, Xian |
|
2012 |
|
14 |
p. 3179-3191 13 p. |
artikel |
3 |
A cognitive management framework for spectrum selection
|
Bouali, F. |
|
2013 |
|
14 |
p. 2752-2765 14 p. |
artikel |
4 |
Adaptive sensing scheduling for cognitive radio systems
|
Jeon, Wha Sook |
|
2012 |
|
14 |
p. 3318-3332 15 p. |
artikel |
5 |
A flexible concast-based grouping service
|
Sehgal, Amit |
|
2006 |
|
14 |
p. 2532-2547 16 p. |
artikel |
6 |
A generalizable dynamic flow pairing method for traffic classification
|
Camacho, José |
|
2013 |
|
14 |
p. 2718-2732 15 p. |
artikel |
7 |
A generic accounting scheme for next generation networks
|
Tsakountakis, Alexandros |
|
2009 |
|
14 |
p. 2408-2426 19 p. |
artikel |
8 |
A geographic directed preferential internet topology model
|
Bar, Sagy |
|
2007 |
|
14 |
p. 4174-4188 15 p. |
artikel |
9 |
A highly flexible service composition framework for real-life networks
|
Schmid, S. |
|
2006 |
|
14 |
p. 2488-2505 18 p. |
artikel |
10 |
A joint network for disaster recovery and search and rescue operations
|
Lakshmi Narayanan, Ram G. |
|
2012 |
|
14 |
p. 3347-3373 27 p. |
artikel |
11 |
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks
|
Huang, Caishi |
|
2012 |
|
14 |
p. 3261-3273 13 p. |
artikel |
12 |
A learning automata based scheduling solution to the dynamic point coverage problem in wireless sensor networks
|
Esnaashari, M. |
|
2010 |
|
14 |
p. 2410-2438 29 p. |
artikel |
13 |
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
|
Sarkar, Mahasweta |
|
2007 |
|
14 |
p. 4005-4031 27 p. |
artikel |
14 |
A measurement study on overhead distribution of value-added internet services
|
Gunes, Mehmet H. |
|
2007 |
|
14 |
p. 4153-4173 21 p. |
artikel |
15 |
A methodology for testing intersection related Vehicle-2-X applications
|
Röglinger, Sebastian |
|
2011 |
|
14 |
p. 3154-3168 15 p. |
artikel |
16 |
An algorithm for privacy-preserving distributed user statistics
|
Tschorsch, Florian |
|
2013 |
|
14 |
p. 2775-2787 13 p. |
artikel |
17 |
An efficient scheduling algorithm for scalable video streaming over P2P networks
|
Hua, Kai-Lung |
|
2013 |
|
14 |
p. 2856-2868 13 p. |
artikel |
18 |
An experimental study of inter-cell interference effects on system performance in unplanned wireless LAN deployments
|
Ergin, Mesut Ali |
|
2008 |
|
14 |
p. 2728-2744 17 p. |
artikel |
19 |
ANQL – An Active Networks Query Language
|
Rogers, Craig Milo |
|
2006 |
|
14 |
p. 2564-2576 13 p. |
artikel |
20 |
An underwater acoustic MAC protocol using reverse opportunistic packet appending
|
Ng, Hai-Heng |
|
2013 |
|
14 |
p. 2733-2751 19 p. |
artikel |
21 |
A performance analysis of block ACK scheme for IEEE 802.11e networks
|
Lee, Hyewon |
|
2010 |
|
14 |
p. 2468-2481 14 p. |
artikel |
22 |
A scalable solution for engineering streaming traffic in the future Internet
|
Baldi, Mario |
|
2007 |
|
14 |
p. 4092-4111 20 p. |
artikel |
23 |
AS-level source routing for multi-provider connection-oriented services
|
Secci, Stefano |
|
2010 |
|
14 |
p. 2453-2467 15 p. |
artikel |
24 |
A stratified traffic sampling methodology for seeing the big picture
|
Fernandes, Stênio |
|
2008 |
|
14 |
p. 2677-2689 13 p. |
artikel |
25 |
A survey of MAC based QoS implementations for WiMAX networks
|
Ahmet Şekercioğlu, Y. |
|
2009 |
|
14 |
p. 2517-2536 20 p. |
artikel |
26 |
A switch-based approach to throughput collapse and starvation in data centers
|
Shpiner, Alexander |
|
2012 |
|
14 |
p. 3333-3346 14 p. |
artikel |
27 |
A trust model based on fuzzy recommendation for mobile ad-hoc networks
|
Luo, Junhai |
|
2009 |
|
14 |
p. 2396-2407 12 p. |
artikel |
28 |
A two-phase approach to interactivity enhancement for large-scale distributed virtual environments
|
Binh Ta, Duong Nguyen |
|
2007 |
|
14 |
p. 4131-4152 22 p. |
artikel |
29 |
Building layered active services
|
Singh Dhillon, Chetan |
|
2006 |
|
14 |
p. 2475-2487 13 p. |
artikel |
30 |
CLAMP: Efficient class-based sampling for flexible flow monitoring
|
Saxena, Mohit |
|
2010 |
|
14 |
p. 2345-2356 12 p. |
artikel |
31 |
Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors
|
Zhang, Pengfei |
|
2013 |
|
14 |
p. 2689-2704 16 p. |
artikel |
32 |
Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices
|
Chien, Hung-Yu |
|
2013 |
|
14 |
p. 2705-2717 13 p. |
artikel |
33 |
Congestion-aware channel assignment for multi-channel wireless mesh networks
|
Mohsenian Rad, A. Hamed |
|
2009 |
|
14 |
p. 2502-2516 15 p. |
artikel |
34 |
Cooperative detection of primary user emulation attacks in CRNs
|
León, Olga |
|
2012 |
|
14 |
p. 3374-3384 11 p. |
artikel |
35 |
CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks
|
Khalil, Issa |
|
2012 |
|
14 |
p. 3300-3317 18 p. |
artikel |
36 |
Deployment and management of component-based services in active networks
|
Solarski, Marcin |
|
2006 |
|
14 |
p. 2506-2518 13 p. |
artikel |
37 |
Development of V-to-X systems in North America: The promise, the pitfalls and the prognosis
|
Misener, James A. |
|
2011 |
|
14 |
p. 3120-3133 14 p. |
artikel |
38 |
Double sense multiple access for wireless ad hoc networks
|
Yang, Yang |
|
2007 |
|
14 |
p. 3978-3988 11 p. |
artikel |
39 |
Dynamically extending the Corral with native code for high-speed packet processing
|
Bos, Herbert |
|
2006 |
|
14 |
p. 2444-2461 18 p. |
artikel |
40 |
Editorial Board
|
|
|
2006 |
|
14 |
p. CO2- 1 p. |
artikel |
41 |
Editorial Board
|
|
|
2010 |
|
14 |
p. IFC- 1 p. |
artikel |
42 |
Editorial Board
|
|
|
2009 |
|
14 |
p. IFC- 1 p. |
artikel |
43 |
Editorial Board
|
|
|
2007 |
|
14 |
p. IFC- 1 p. |
artikel |
44 |
Editorial Board
|
|
|
2008 |
|
14 |
p. IFC- 1 p. |
artikel |
45 |
Editorial Board
|
|
|
2013 |
|
14 |
p. IFC- 1 p. |
artikel |
46 |
Editorial Board
|
|
|
2011 |
|
14 |
p. IFC- 1 p. |
artikel |
47 |
Editorial Board
|
|
|
2012 |
|
14 |
p. IFC- 1 p. |
artikel |
48 |
Editorial for the Special Issue: Deploying vehicle-2-x communication
|
Herrtwich, R.G. |
|
2011 |
|
14 |
p. 3101-3102 2 p. |
artikel |
49 |
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method
|
Wang, Ze |
|
2013 |
|
14 |
p. 2788-2801 14 p. |
artikel |
50 |
Efficient many-to-one authentication with certificateless aggregate signatures
|
Zhang, Lei |
|
2010 |
|
14 |
p. 2482-2491 10 p. |
artikel |
51 |
ElisaTM – Car to infrastructure communication in the field
|
Schweiger, Benno |
|
2011 |
|
14 |
p. 3169-3178 10 p. |
artikel |
52 |
Error analysis of non-collaborative wireless localization in circular-shaped regions
|
Zhou, Junyi |
|
2010 |
|
14 |
p. 2439-2452 14 p. |
artikel |
53 |
Evolutionary algorithms for orthogonal frequency division multiplexing-based dynamic spectrum access systems
|
Ahmadi, H. |
|
2012 |
|
14 |
p. 3206-3218 13 p. |
artikel |
54 |
FIB Aplasia through probabilistic routing and autoforwarding
|
Rossini, Giuseppe |
|
2013 |
|
14 |
p. 2802-2816 15 p. |
artikel |
55 |
Flexible network monitoring with FLAME
|
Anagnostakis, K.G. |
|
2006 |
|
14 |
p. 2548-2563 16 p. |
artikel |
56 |
Game theory for cognitive radio networks: An overview
|
Wang, Beibei |
|
2010 |
|
14 |
p. 2537-2561 25 p. |
artikel |
57 |
GRiDA: GReen Distributed Algorithm for energy-efficient IP backbone networks
|
Bianzino, Aruna Prem |
|
2012 |
|
14 |
p. 3219-3232 14 p. |
artikel |
58 |
Group multicast routing problem: A genetic algorithms based approach
|
Sanna Randaccio, L. |
|
2007 |
|
14 |
p. 3989-4004 16 p. |
artikel |
59 |
Guest Editorial
|
Plattner, Bernhard |
|
2006 |
|
14 |
p. 2421-2425 5 p. |
artikel |
60 |
Heuristic algorithms for designing self-repairing protection trees in mesh networks
|
Shah-Heydari, Shahram |
|
2009 |
|
14 |
p. 2537-2551 15 p. |
artikel |
61 |
Hierarchical Mobility Label Based Network: System model and performance analysis
|
Berzin, Oleg |
|
2010 |
|
14 |
p. 2357-2382 26 p. |
artikel |
62 |
Hose workload based exact algorithm for the optimal design of virtual private networks
|
Diarrassouba, Ibrahima |
|
2013 |
|
14 |
p. 2766-2774 9 p. |
artikel |
63 |
Impact of mobility on the performance of relaying in ad hoc networks – Extended version
|
Al Hanbali, A. |
|
2007 |
|
14 |
p. 4112-4130 19 p. |
artikel |
64 |
Impact of routing parameters on route diversity and path inflation
|
Mühlbauer, Wolfgang |
|
2010 |
|
14 |
p. 2506-2518 13 p. |
artikel |
65 |
Improved layout of the odd–even sorting network
|
Artishchev-Zapolotsky, Maria |
|
2009 |
|
14 |
p. 2387-2395 9 p. |
artikel |
66 |
Improving manageability through reorganization of routing-policy configurations
|
Lee, Sihyung |
|
2012 |
|
14 |
p. 3192-3205 14 p. |
artikel |
67 |
Incentive-based control of ad hoc networks: A performance study
|
Göbel, Johannes |
|
2009 |
|
14 |
p. 2427-2443 17 p. |
artikel |
68 |
Information discovery in mission-critical wireless sensor networks
|
Doss, Robin |
|
2010 |
|
14 |
p. 2383-2399 17 p. |
artikel |
69 |
Interactivity vs. fairness in networked Linux systems
|
Wu, Wenji |
|
2007 |
|
14 |
p. 4050-4069 20 p. |
artikel |
70 |
Internet traffic modeling by means of Hidden Markov Models
|
Dainotti, Alberto |
|
2008 |
|
14 |
p. 2645-2662 18 p. |
artikel |
71 |
LIAD: Adaptive bandwidth prediction based Logarithmic Increase Adaptive Decrease for TCP congestion control in heterogeneous wireless networks
|
Chang, Ben-Jye |
|
2009 |
|
14 |
p. 2566-2585 20 p. |
artikel |
72 |
Lightweight thread tunnelling in network applications
|
Donnelly, Austin |
|
2006 |
|
14 |
p. 2462-2474 13 p. |
artikel |
73 |
Locating resources in a programmable networking environment
|
Smith, Paul |
|
2006 |
|
14 |
p. 2519-2531 13 p. |
artikel |
74 |
Markovian-based traffic modeling for mobile ad hoc networks
|
Calafate, Carlos T. |
|
2009 |
|
14 |
p. 2586-2600 15 p. |
artikel |
75 |
Maximizing connected coverage via controlled actor relocation in wireless sensor and actor networks
|
Akkaya, K. |
|
2008 |
|
14 |
p. 2779-2796 18 p. |
artikel |
76 |
On the capacity of UWB-based wireless sensor networks
|
Shi, Yi |
|
2008 |
|
14 |
p. 2797-2804 8 p. |
artikel |
77 |
On the difficulty of achieving anonymity for Vehicle-2-X communication
|
Troncoso, Carmela |
|
2011 |
|
14 |
p. 3199-3210 12 p. |
artikel |
78 |
On the interaction between localization and location verification for wireless sensor networks
|
Al-Abri, Dawood |
|
2008 |
|
14 |
p. 2713-2727 15 p. |
artikel |
79 |
On the predictability of large transfer TCP throughput
|
He, Qi |
|
2007 |
|
14 |
p. 3959-3977 19 p. |
artikel |
80 |
Optimal algorithms for the batch scheduling problem in OBS networks
|
Figueiredo, Gustavo B. |
|
2012 |
|
14 |
p. 3274-3286 13 p. |
artikel |
81 |
Optimal configuration of roadside beacons in V2I communications
|
Vales-Alonso, J. |
|
2011 |
|
14 |
p. 3142-3153 12 p. |
artikel |
82 |
Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks
|
Gąsior, Dariusz |
|
2013 |
|
14 |
p. 2817-2832 16 p. |
artikel |
83 |
Passive analysis of TCP anomalies
|
Mellia, Marco |
|
2008 |
|
14 |
p. 2663-2676 14 p. |
artikel |
84 |
Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments
|
de Cola, Tomaso |
|
2007 |
|
14 |
p. 4032-4049 18 p. |
artikel |
85 |
Performance analysis of CSMA/CA protocols with multi-packet transmission
|
Bellalta, B. |
|
2013 |
|
14 |
p. 2675-2688 14 p. |
artikel |
86 |
P2P as a CDN: A new service model for file sharing
|
Mondal, Amit |
|
2012 |
|
14 |
p. 3233-3246 14 p. |
artikel |
87 |
Privacy leakage on the Web: Diffusion and countermeasures
|
Malandrino, Delfina |
|
2013 |
|
14 |
p. 2833-2855 23 p. |
artikel |
88 |
Processing top-k queries from samples
|
Cohen, Edith |
|
2008 |
|
14 |
p. 2605-2622 18 p. |
artikel |
89 |
Providing scalable NH-diverse iBGP route re-distribution to achieve sub-second switch-over time
|
Pelsser, Cristel |
|
2010 |
|
14 |
p. 2492-2505 14 p. |
artikel |
90 |
REED: Flexible rule based programming of wireless sensor networks at runtime
|
Fei, Xiang |
|
2012 |
|
14 |
p. 3287-3299 13 p. |
artikel |
91 |
REFACING: An autonomic approach to network security based on multidimensional trustworthiness
|
Oliviero, F. |
|
2008 |
|
14 |
p. 2745-2763 19 p. |
artikel |
92 |
Resilient network admission control
|
Menth, Michael |
|
2008 |
|
14 |
p. 2805-2815 11 p. |
artikel |
93 |
Routing in ad-hoc networks with MIMO links: Optimization considerations and protocols
|
Sundaresan, Karthikeyan |
|
2008 |
|
14 |
p. 2623-2644 22 p. |
artikel |
94 |
RPL in a nutshell: A survey
|
Gaddour, Olfa |
|
2012 |
|
14 |
p. 3163-3178 16 p. |
artikel |
95 |
Simulation of vehicular ad-hoc networks: Challenges, review of tools and recommendations
|
Stanica, Razvan |
|
2011 |
|
14 |
p. 3179-3188 10 p. |
artikel |
96 |
SLDRT: A measurement technique for available bandwidth on multi-hop path with bursty cross traffic
|
Hu, Zhiguo |
|
2012 |
|
14 |
p. 3247-3260 14 p. |
artikel |
97 |
Small-buffer networks
|
Shifrin, Mark |
|
2009 |
|
14 |
p. 2552-2565 14 p. |
artikel |
98 |
Snow on silk: Layering NodeOS functionality on conventional operating systems
|
Shalaby, Nadia |
|
2006 |
|
14 |
p. 2426-2443 18 p. |
artikel |
99 |
SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery
|
Rakotoarivelo, Thierry |
|
2007 |
|
14 |
p. 4189-4211 23 p. |
artikel |
100 |
Spectrum sharing in cognitive radio networks with imperfect sensing: A discrete-time Markov model
|
Gelabert, Xavier |
|
2010 |
|
14 |
p. 2519-2536 18 p. |
artikel |
101 |
Support for resilient Peer-to-Peer gaming
|
Norden, Samphel |
|
2007 |
|
14 |
p. 4212-4233 22 p. |
artikel |
102 |
Support Vector Machines for TCP traffic classification
|
Este, Alice |
|
2009 |
|
14 |
p. 2476-2490 15 p. |
artikel |
103 |
TARP: A traffic-aware restructuring protocol for Bluetooth radio networks
|
Chang, Chih-Yung |
|
2007 |
|
14 |
p. 4070-4091 22 p. |
artikel |
104 |
TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs
|
Marfia, Gustavo |
|
2010 |
|
14 |
p. 2327-2344 18 p. |
artikel |
105 |
The changing usage of a mature campus-wide wireless network
|
Henderson, Tristan |
|
2008 |
|
14 |
p. 2690-2712 23 p. |
artikel |
106 |
The choice of the best among the shortest routes in transparent optical networks
|
Durães, Gilvan M. |
|
2010 |
|
14 |
p. 2400-2409 10 p. |
artikel |
107 |
The latest trend of v2x driver assistance systems in Japan
|
Fukushima, Masao |
|
2011 |
|
14 |
p. 3134-3141 8 p. |
artikel |
108 |
TMCP: Two-layer multicast communication protocol for Bluetooth radio networks
|
Chang, Chao-Tsun |
|
2008 |
|
14 |
p. 2764-2778 15 p. |
artikel |
109 |
Traffic monitor deployment in IP networks
|
Zang, Hui |
|
2009 |
|
14 |
p. 2491-2501 11 p. |
artikel |
110 |
Transport-independent fairness
|
Behsaz, B. |
|
2009 |
|
14 |
p. 2444-2457 14 p. |
artikel |
111 |
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks
|
Xiao, Yang |
|
2009 |
|
14 |
p. 2458-2475 18 p. |
artikel |
112 |
V2X communication in Europe – From research projects towards standardization and field testing of vehicle communication technology
|
Weiß, Christian |
|
2011 |
|
14 |
p. 3103-3119 17 p. |
artikel |
113 |
V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems
|
Schünemann, Björn |
|
2011 |
|
14 |
p. 3189-3198 10 p. |
artikel |