nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A connection-oriented network architecture with guaranteed QoS for future real-time applications over the Internet
|
Gamage, Manodha |
|
2006 |
|
8 |
p. 1130-1144 15 p. |
artikel |
2 |
A Fokker–Planck equation method predicting Buffer occupancy in a single queue
|
Dolcy, Dawn S.L. |
|
2007 |
|
8 |
p. 2198-2216 19 p. |
artikel |
3 |
A Generalized Bloom Filter to Secure Distributed Network Applications
|
Laufer, Rafael P. |
|
2011 |
|
8 |
p. 1804-1819 16 p. |
artikel |
4 |
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
|
Fanian, Ali |
|
2011 |
|
8 |
p. 1849-1863 15 p. |
artikel |
5 |
Algorithms for IP network design with end-to-end QoS constraints
|
Wille, Emilio C.G. |
|
2006 |
|
8 |
p. 1086-1103 18 p. |
artikel |
6 |
A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks
|
Franklin, A. Antony |
|
2008 |
|
8 |
p. 1583-1602 20 p. |
artikel |
7 |
An adaptive peer-to-peer live streaming system with incentives for resilience
|
Park, Kunwoo |
|
2010 |
|
8 |
p. 1316-1327 12 p. |
artikel |
8 |
An analytical model of a new packet marking algorithm for TCP flows
|
Neglia, Giovanni |
|
2006 |
|
8 |
p. 1176-1191 16 p. |
artikel |
9 |
An analytic framework for performance modeling of software transactional memory
|
Heindl, Armin |
|
2009 |
|
8 |
p. 1202-1214 13 p. |
artikel |
10 |
An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access
|
Ge, Ye |
|
2007 |
|
8 |
p. 1955-1980 26 p. |
artikel |
11 |
An efficient key management scheme for content access control for linear hierarchies
|
Ragab Hassen, Hani |
|
2012 |
|
8 |
p. 2107-2118 12 p. |
artikel |
12 |
AntBot: Anti-pollution peer-to-peer botnets
|
Yan, Guanhua |
|
2011 |
|
8 |
p. 1941-1956 16 p. |
artikel |
13 |
Approximate transient analysis of large stochastic models with WinPEPSY-QNS
|
Bazan, Peter |
|
2009 |
|
8 |
p. 1289-1301 13 p. |
artikel |
14 |
A reliability analysis of Double-Ring topologies with Dual Attachment using p-cycles for optical metro networks
|
Santiago del Río, P.M. |
|
2010 |
|
8 |
p. 1328-1341 14 p. |
artikel |
15 |
A simple and robust handover authentication between HeNB and eNB in LTE networks
|
Cao, Jin |
|
2012 |
|
8 |
p. 2119-2131 13 p. |
artikel |
16 |
Associative search in peer to peer networks: Harnessing latent semantics
|
Cohen, Edith |
|
2007 |
|
8 |
p. 1861-1881 21 p. |
artikel |
17 |
A survey of IP and multiprotocol label switching fast reroute schemes
|
Raj, Alex |
|
2007 |
|
8 |
p. 1882-1907 26 p. |
artikel |
18 |
A survey on automatic configuration of virtual private networks
|
Rossberg, Michael |
|
2011 |
|
8 |
p. 1684-1699 16 p. |
artikel |
19 |
A traffic based decomposition of two-class queueing networks with priority service
|
Horváth, András |
|
2009 |
|
8 |
p. 1235-1248 14 p. |
artikel |
20 |
Authenticating public terminals
|
Asokan, N |
|
1999 |
|
8 |
p. 861-870 10 p. |
artikel |
21 |
Bandwidth sensitive fast failure recovery scheme for Metro Ethernet
|
Nair, Padmaraj M.V. |
|
2008 |
|
8 |
p. 1603-1616 14 p. |
artikel |
22 |
Broker-placement in latency-aware peer-to-peer networks
|
Garbacki, Paweł |
|
2008 |
|
8 |
p. 1617-1633 17 p. |
artikel |
23 |
Building a high-performance, programmable secure coprocessor
|
Smith, Sean W |
|
1999 |
|
8 |
p. 831-860 30 p. |
artikel |
24 |
Building a network-aware and load-balanced peer-to-peer system for range queries
|
Joung, Yuh-Jzer |
|
2012 |
|
8 |
p. 2148-2167 20 p. |
artikel |
25 |
Capacity planning in IP Virtual Private Networks under mixed traffic
|
Bolla, Raffaele |
|
2006 |
|
8 |
p. 1069-1085 17 p. |
artikel |
26 |
Comparison and analysis of the revenue-based adaptive queuing models
|
Sayenko, Alexander |
|
2006 |
|
8 |
p. 1040-1058 19 p. |
artikel |
27 |
Comparison of end-to-end and network-supported fast startup congestion control schemes
|
Scharf, Michael |
|
2011 |
|
8 |
p. 1921-1940 20 p. |
artikel |
28 |
Comparison of load-balancing approaches for multipath connectivity
|
Mäkelä, Antti |
|
2012 |
|
8 |
p. 2179-2195 17 p. |
artikel |
29 |
Conference
|
|
|
1999 |
|
8 |
p. 895-899 5 p. |
artikel |
30 |
Conjugate network calculus: A dual approach applying the Legendre transform
|
Fidler, Markus |
|
2006 |
|
8 |
p. 1026-1039 14 p. |
artikel |
31 |
Consistent proportional delay differentiation: A fuzzy control approach
|
Wei, Jianbin |
|
2007 |
|
8 |
p. 2015-2032 18 p. |
artikel |
32 |
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks
|
Rondinone, Michele |
|
2013 |
|
8 |
p. 1821-1837 17 p. |
artikel |
33 |
Contents Continued
|
|
|
2007 |
|
8 |
p. 2218- 1 p. |
artikel |
34 |
Cross-layer optimization of wireless multihop networks with one-hop two-way network coding
|
You, Lei |
|
2011 |
|
8 |
p. 1747-1769 23 p. |
artikel |
35 |
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
|
Weng, Ning |
|
2011 |
|
8 |
p. 1648-1661 14 p. |
artikel |
36 |
Describing and simulating internet routes
|
Leguay, Jérémie |
|
2007 |
|
8 |
p. 2067-2085 19 p. |
artikel |
37 |
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks
|
Wang, Qi |
|
2008 |
|
8 |
p. 1647-1674 28 p. |
artikel |
38 |
Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems
|
Chek, Michael Cho-Hoi |
|
2007 |
|
8 |
p. 2086-2103 18 p. |
artikel |
39 |
Detector SherLOCK: Enhancing TRW with Bloom filters under memory and performance constraints
|
Nam, Seung Yeob |
|
2008 |
|
8 |
p. 1545-1566 22 p. |
artikel |
40 |
Disjoint multipath routing using colored trees
|
Ramasubramanian, Srinivasan |
|
2007 |
|
8 |
p. 2163-2180 18 p. |
artikel |
41 |
DPillar: Dual-port server interconnection network for large scale data centers
|
Liao, Yong |
|
2012 |
|
8 |
p. 2132-2147 16 p. |
artikel |
42 |
Dynamic landmark triangles: A simple and efficient mechanism for inter-host latency estimation
|
Wen, Zhihua |
|
2011 |
|
8 |
p. 1864-1879 16 p. |
artikel |
43 |
Editorial
|
|
|
1999 |
|
8 |
p. 785-786 2 p. |
artikel |
44 |
Editorial Board
|
|
|
2008 |
|
8 |
p. IFC- 1 p. |
artikel |
45 |
Editorial Board
|
|
|
2006 |
|
8 |
p. CO2- 1 p. |
artikel |
46 |
Editorial Board
|
|
|
2010 |
|
8 |
p. IFC- 1 p. |
artikel |
47 |
Editorial Board
|
|
|
2009 |
|
8 |
p. IFC- 1 p. |
artikel |
48 |
Editorial Board
|
|
|
2007 |
|
8 |
p. IFC- 1 p. |
artikel |
49 |
Editorial Board
|
|
|
2013 |
|
8 |
p. IFC- 1 p. |
artikel |
50 |
Editorial Board
|
|
|
2012 |
|
8 |
p. IFC- 1 p. |
artikel |
51 |
Editorial Board
|
|
|
2011 |
|
8 |
p. IFC- 1 p. |
artikel |
52 |
Efficient downlink scheduling with power boosting in mobile IEEE 802.16 networks
|
Caretti, M. |
|
2011 |
|
8 |
p. 1672-1683 12 p. |
artikel |
53 |
Efficient heuristics for energy-aware routing in networks with bundled links
|
Lin, Gongqi |
|
2013 |
|
8 |
p. 1774-1788 15 p. |
artikel |
54 |
Expected convergence properties of BGP
|
Viswanathan, Ramesh |
|
2011 |
|
8 |
p. 1957-1981 25 p. |
artikel |
55 |
Finite-source M / M / S retrial queue with search for balking and impatient customers from the orbit
|
Wüchner, Patrick |
|
2009 |
|
8 |
p. 1264-1273 10 p. |
artikel |
56 |
Flow-level performance of proportional fairness with hierarchical modulation in OFDMA-based networks
|
Jdidi, Anis |
|
2011 |
|
8 |
p. 1784-1793 10 p. |
artikel |
57 |
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link
|
Weber, Steven |
|
2007 |
|
8 |
p. 1981-1997 17 p. |
artikel |
58 |
Free-scaling your data center
|
Gyarmati, László |
|
2013 |
|
8 |
p. 1758-1773 16 p. |
artikel |
59 |
Fuzzy-based load self-configuration in mobile P2P services
|
Macedo, Daniel F. |
|
2011 |
|
8 |
p. 1834-1848 15 p. |
artikel |
60 |
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm
|
Galluccio, Laura |
|
2007 |
|
8 |
p. 1998-2014 17 p. |
artikel |
61 |
Graption: A graph-based P2P traffic classification framework for the internet backbone
|
Iliofotou, Marios |
|
2011 |
|
8 |
p. 1909-1920 12 p. |
artikel |
62 |
Group registration with distributed databases for location tracking in 3G wireless networks
|
Vergados, Dimitrios D. |
|
2008 |
|
8 |
p. 1521-1544 24 p. |
artikel |
63 |
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency
|
Li, Zhichun |
|
2010 |
|
8 |
p. 1282-1299 18 p. |
artikel |
64 |
Impact analysis of BGP sessions for prioritization of maintenance operations
|
Lee, Sihyung |
|
2012 |
|
8 |
p. 2206-2220 15 p. |
artikel |
65 |
Improving the efficiency of multipath traffic via opportunistic traffic scheduling
|
Cetinkaya, Coskun |
|
2007 |
|
8 |
p. 2181-2197 17 p. |
artikel |
66 |
Independent links: A new approach to increase spatial reuse in wireless networks
|
Pires, Alexandre A. |
|
2013 |
|
8 |
p. 1880-1893 14 p. |
artikel |
67 |
Indoor localization method based on RTT and AOA using coordinates clustering
|
Dakkak, M. |
|
2011 |
|
8 |
p. 1794-1803 10 p. |
artikel |
68 |
Insensitive load balancing in data networks
|
Leino, J. |
|
2006 |
|
8 |
p. 1059-1068 10 p. |
artikel |
69 |
Integrating SIP and IEEE 802.11e to support handoff and multi-grade QoS for VoIP-over-WLAN applications
|
Chen, Jen-Jee |
|
2011 |
|
8 |
p. 1719-1734 16 p. |
artikel |
70 |
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
|
Ozdemir, Suat |
|
2011 |
|
8 |
p. 1735-1746 12 p. |
artikel |
71 |
Internet security architecture
|
Molva, Refik |
|
1999 |
|
8 |
p. 787-804 18 p. |
artikel |
72 |
Intrusion detection using neural based hybrid classification methods
|
Govindarajan, M. |
|
2011 |
|
8 |
p. 1662-1671 10 p. |
artikel |
73 |
Investigation of the M 2 / G 2 / 1 / ∞ , N queue with restricted admission of priority customers and its application to HSDPA mobile systems
|
Al-Begain, Khalid |
|
2009 |
|
8 |
p. 1186-1201 16 p. |
artikel |
74 |
Leveraging network performance with IPv6 multihoming and multiple provider-dependent aggregatable prefixes
|
de Launois, Cédric |
|
2006 |
|
8 |
p. 1145-1157 13 p. |
artikel |
75 |
Loop-free alternates and not-via addresses: A proper combination for IP fast reroute?
|
Menth, Michael |
|
2010 |
|
8 |
p. 1300-1315 16 p. |
artikel |
76 |
Lowering security overhead in link state routing 1 An earlier version of this paper [19] was presented at the ISOC (Symposium on Network and Distributed System Security), February 1997, San Diego, CA, USA. 1
|
Hauser, Ralf |
|
1999 |
|
8 |
p. 885-894 10 p. |
artikel |
77 |
MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems
|
Yang, Shengbo |
|
2013 |
|
8 |
p. 1805-1820 16 p. |
artikel |
78 |
Network survivability modeling
|
Heegaard, Poul E. |
|
2009 |
|
8 |
p. 1215-1234 20 p. |
artikel |
79 |
Novel association control strategies for multicasting in relay-enabled WLANs
|
Chin, Kwan-Wu |
|
2012 |
|
8 |
p. 2168-2178 11 p. |
artikel |
80 |
On the behavior of stable subnetworks in non-ergodic networks with unreliable nodes
|
Mylosz, J. |
|
2009 |
|
8 |
p. 1249-1263 15 p. |
artikel |
81 |
On the design of mobility management scheme for 802.16-based network environment
|
Yang, Chun-Chuan |
|
2007 |
|
8 |
p. 2049-2066 18 p. |
artikel |
82 |
On the design of reliable wireless mesh network infrastructure with QoS constraints
|
Benyamina, D. |
|
2011 |
|
8 |
p. 1631-1647 17 p. |
artikel |
83 |
On the design of resilient heterogeneous wireless sensor networks based on small world concepts
|
Guidoni, Daniel L. |
|
2010 |
|
8 |
p. 1266-1281 16 p. |
artikel |
84 |
On the effects of the packet size distribution on FEC performance
|
Dán, György |
|
2006 |
|
8 |
p. 1104-1129 26 p. |
artikel |
85 |
On the optimal, fair and channel-aware cognitive radio network reconfiguration
|
Arkoulis, Stamatios |
|
2013 |
|
8 |
p. 1739-1757 19 p. |
artikel |
86 |
On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks
|
Manoj, B.S. |
|
2007 |
|
8 |
p. 2126-2143 18 p. |
artikel |
87 |
Operating point selection for primary and secondary users in cognitive radio networks
|
Gelabert, Xavier |
|
2009 |
|
8 |
p. 1158-1170 13 p. |
artikel |
88 |
Optimal configuration of an optical network providing predefined multicast transmissions
|
Reinhard, Vincent |
|
2012 |
|
8 |
p. 2097-2106 10 p. |
artikel |
89 |
Optimal threshold control by the robots of web search engines with obsolescence of documents
|
Avrachenkov, Konstantin |
|
2011 |
|
8 |
p. 1880-1893 14 p. |
artikel |
90 |
Packet forwarding with source verification
|
Shue, Craig A. |
|
2008 |
|
8 |
p. 1567-1582 16 p. |
artikel |
91 |
Performance analysis of a delay tolerant application for herd localization
|
Dopico, Nelson I. |
|
2011 |
|
8 |
p. 1770-1783 14 p. |
artikel |
92 |
Performance analysis of the AntNet algorithm
|
Dhillon, S.S. |
|
2007 |
|
8 |
p. 2104-2125 22 p. |
artikel |
93 |
Performance evaluations of ZigBee in different smart grid environments
|
Bilgin, B.E. |
|
2012 |
|
8 |
p. 2196-2205 10 p. |
artikel |
94 |
”Performance Modeling of Computer Networks: Special Issue in Memory of Dr. Gunter Bolch” (Eulogies and Editorials)
|
|
|
2009 |
|
8 |
p. 1155-1157 3 p. |
artikel |
95 |
Per-station throughput fairness in a WLAN hot-spot with TCP traffic
|
Detti, A. |
|
2011 |
|
8 |
p. 1820-1833 14 p. |
artikel |
96 |
Proportional and double imitation rules for spectrum access in cognitive radio networks
|
Iellamo, Stefano |
|
2013 |
|
8 |
p. 1863-1879 17 p. |
artikel |
97 |
Q-MEHROM: Mobility support and resource reservations for mobile senders and receivers
|
Peters, Liesbeth |
|
2006 |
|
8 |
p. 1158-1175 18 p. |
artikel |
98 |
QoS-aware game-theoretic rate & power control for CDMA wireless communication networks
|
Bacci, Giacomo |
|
2013 |
|
8 |
p. 1789-1804 16 p. |
artikel |
99 |
QoS-aware MAC protocols for wireless sensor networks: A survey
|
Yigitel, M. Aykut |
|
2011 |
|
8 |
p. 1982-2004 23 p. |
artikel |
100 |
QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future
|
Kim, Hwangnam |
|
2007 |
|
8 |
p. 1922-1941 20 p. |
artikel |
101 |
Queen-MAC: A quorum-based energy-efficient medium access control protocol for wireless sensor networks
|
Ekbatanifard, GholamHossein |
|
2012 |
|
8 |
p. 2221-2236 16 p. |
artikel |
102 |
Rate adaptation with joint receive diversity and power control for cognitive radio networks
|
Wang, Jui Teng |
|
2011 |
|
8 |
p. 1711-1718 8 p. |
artikel |
103 |
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
|
Sterbenz, James P.G. |
|
2010 |
|
8 |
p. 1245-1265 21 p. |
artikel |
104 |
Resilient and survivable networks
|
Plattner, Bernhard |
|
2010 |
|
8 |
p. 1243-1244 2 p. |
artikel |
105 |
Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol
|
Carofiglio, Giovanna |
|
2013 |
|
8 |
p. 1838-1852 15 p. |
artikel |
106 |
SAM-MAC: An efficient channel assignment scheme for multi-channel ad hoc networks
|
Huang, Rongsheng |
|
2008 |
|
8 |
p. 1634-1646 13 p. |
artikel |
107 |
Selected papers from the 3rd international workshop on QoS in multiservice IP networks (QoS-IP 2005)
|
Bianchi, Giuseppe |
|
2006 |
|
8 |
p. 1023-1025 3 p. |
artikel |
108 |
Self-prevention of socket buffer overflow
|
Choi, Jin-Hee |
|
2007 |
|
8 |
p. 1942-1954 13 p. |
artikel |
109 |
Solution for the broadcasting in the Kademlia peer-to-peer overlay
|
Czirkos, Zoltán |
|
2013 |
|
8 |
p. 1853-1862 10 p. |
artikel |
110 |
Stochastic and deterministic performance evaluation of automotive CAN communication
|
Herpel, Thomas |
|
2009 |
|
8 |
p. 1171-1185 15 p. |
artikel |
111 |
The “Global-ISP” paradigm
|
Cohen, Reuven |
|
2007 |
|
8 |
p. 1908-1921 14 p. |
artikel |
112 |
The modeling power of CINSim: Performance evaluation of interconnection networks
|
Lüdtke, D. |
|
2009 |
|
8 |
p. 1274-1288 15 p. |
artikel |
113 |
The nature of a useable PKI
|
Ellison, Carl M |
|
1999 |
|
8 |
p. 823-830 8 p. |
artikel |
114 |
Towards a platform for wide-area overlay network deployment and management
|
MacLarty, Glen |
|
2007 |
|
8 |
p. 2144-2162 19 p. |
artikel |
115 |
Towards a taxonomy of intrusion-detection systems
|
Debar, Hervé |
|
1999 |
|
8 |
p. 805-822 18 p. |
artikel |
116 |
Tree based dynamic address autoconfiguration in mobile ad hoc networks
|
Al-Mistarihi, Mamoun F. |
|
2011 |
|
8 |
p. 1894-1908 15 p. |
artikel |
117 |
Untraceable mobility or how to travel incognito 1 An earlier version of this paper was presented at IEEE Workshop on Mobile Systems and Applications [22]. 1
|
Ateniese, Giuseppe |
|
1999 |
|
8 |
p. 871-884 14 p. |
artikel |
118 |
Upgrading unicast nodes to multicast-capable nodes in all-optical networks
|
Chan, Tony K.C. |
|
2011 |
|
8 |
p. 2005-2021 17 p. |
artikel |
119 |
User-level satisfaction aware end-to-end rate control in communication networks
|
Roh, Hee-Tae |
|
2011 |
|
8 |
p. 1700-1710 11 p. |
artikel |
120 |
Why TCP timers (still) don’t work well
|
Psaras, Ioannis |
|
2007 |
|
8 |
p. 2033-2048 16 p. |
artikel |