Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             120 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A connection-oriented network architecture with guaranteed QoS for future real-time applications over the Internet Gamage, Manodha
2006
8 p. 1130-1144
15 p.
artikel
2 A Fokker–Planck equation method predicting Buffer occupancy in a single queue Dolcy, Dawn S.L.
2007
8 p. 2198-2216
19 p.
artikel
3 A Generalized Bloom Filter to Secure Distributed Network Applications Laufer, Rafael P.
2011
8 p. 1804-1819
16 p.
artikel
4 A high performance and intrinsically secure key establishment protocol for wireless sensor networks Fanian, Ali
2011
8 p. 1849-1863
15 p.
artikel
5 Algorithms for IP network design with end-to-end QoS constraints Wille, Emilio C.G.
2006
8 p. 1086-1103
18 p.
artikel
6 A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks Franklin, A. Antony
2008
8 p. 1583-1602
20 p.
artikel
7 An adaptive peer-to-peer live streaming system with incentives for resilience Park, Kunwoo
2010
8 p. 1316-1327
12 p.
artikel
8 An analytical model of a new packet marking algorithm for TCP flows Neglia, Giovanni
2006
8 p. 1176-1191
16 p.
artikel
9 An analytic framework for performance modeling of software transactional memory Heindl, Armin
2009
8 p. 1202-1214
13 p.
artikel
10 An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access Ge, Ye
2007
8 p. 1955-1980
26 p.
artikel
11 An efficient key management scheme for content access control for linear hierarchies Ragab Hassen, Hani
2012
8 p. 2107-2118
12 p.
artikel
12 AntBot: Anti-pollution peer-to-peer botnets Yan, Guanhua
2011
8 p. 1941-1956
16 p.
artikel
13 Approximate transient analysis of large stochastic models with WinPEPSY-QNS Bazan, Peter
2009
8 p. 1289-1301
13 p.
artikel
14 A reliability analysis of Double-Ring topologies with Dual Attachment using p-cycles for optical metro networks Santiago del Río, P.M.
2010
8 p. 1328-1341
14 p.
artikel
15 A simple and robust handover authentication between HeNB and eNB in LTE networks Cao, Jin
2012
8 p. 2119-2131
13 p.
artikel
16 Associative search in peer to peer networks: Harnessing latent semantics Cohen, Edith
2007
8 p. 1861-1881
21 p.
artikel
17 A survey of IP and multiprotocol label switching fast reroute schemes Raj, Alex
2007
8 p. 1882-1907
26 p.
artikel
18 A survey on automatic configuration of virtual private networks Rossberg, Michael
2011
8 p. 1684-1699
16 p.
artikel
19 A traffic based decomposition of two-class queueing networks with priority service Horváth, András
2009
8 p. 1235-1248
14 p.
artikel
20 Authenticating public terminals Asokan, N
1999
8 p. 861-870
10 p.
artikel
21 Bandwidth sensitive fast failure recovery scheme for Metro Ethernet Nair, Padmaraj M.V.
2008
8 p. 1603-1616
14 p.
artikel
22 Broker-placement in latency-aware peer-to-peer networks Garbacki, Paweł
2008
8 p. 1617-1633
17 p.
artikel
23 Building a high-performance, programmable secure coprocessor Smith, Sean W
1999
8 p. 831-860
30 p.
artikel
24 Building a network-aware and load-balanced peer-to-peer system for range queries Joung, Yuh-Jzer
2012
8 p. 2148-2167
20 p.
artikel
25 Capacity planning in IP Virtual Private Networks under mixed traffic Bolla, Raffaele
2006
8 p. 1069-1085
17 p.
artikel
26 Comparison and analysis of the revenue-based adaptive queuing models Sayenko, Alexander
2006
8 p. 1040-1058
19 p.
artikel
27 Comparison of end-to-end and network-supported fast startup congestion control schemes Scharf, Michael
2011
8 p. 1921-1940
20 p.
artikel
28 Comparison of load-balancing approaches for multipath connectivity Mäkelä, Antti
2012
8 p. 2179-2195
17 p.
artikel
29 Conference 1999
8 p. 895-899
5 p.
artikel
30 Conjugate network calculus: A dual approach applying the Legendre transform Fidler, Markus
2006
8 p. 1026-1039
14 p.
artikel
31 Consistent proportional delay differentiation: A fuzzy control approach Wei, Jianbin
2007
8 p. 2015-2032
18 p.
artikel
32 Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks Rondinone, Michele
2013
8 p. 1821-1837
17 p.
artikel
33 Contents Continued 2007
8 p. 2218-
1 p.
artikel
34 Cross-layer optimization of wireless multihop networks with one-hop two-way network coding You, Lei
2011
8 p. 1747-1769
23 p.
artikel
35 Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system Weng, Ning
2011
8 p. 1648-1661
14 p.
artikel
36 Describing and simulating internet routes Leguay, Jérémie
2007
8 p. 2067-2085
19 p.
artikel
37 Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks Wang, Qi
2008
8 p. 1647-1674
28 p.
artikel
38 Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems Chek, Michael Cho-Hoi
2007
8 p. 2086-2103
18 p.
artikel
39 Detector SherLOCK: Enhancing TRW with Bloom filters under memory and performance constraints Nam, Seung Yeob
2008
8 p. 1545-1566
22 p.
artikel
40 Disjoint multipath routing using colored trees Ramasubramanian, Srinivasan
2007
8 p. 2163-2180
18 p.
artikel
41 DPillar: Dual-port server interconnection network for large scale data centers Liao, Yong
2012
8 p. 2132-2147
16 p.
artikel
42 Dynamic landmark triangles: A simple and efficient mechanism for inter-host latency estimation Wen, Zhihua
2011
8 p. 1864-1879
16 p.
artikel
43 Editorial 1999
8 p. 785-786
2 p.
artikel
44 Editorial Board 2008
8 p. IFC-
1 p.
artikel
45 Editorial Board 2006
8 p. CO2-
1 p.
artikel
46 Editorial Board 2010
8 p. IFC-
1 p.
artikel
47 Editorial Board 2009
8 p. IFC-
1 p.
artikel
48 Editorial Board 2007
8 p. IFC-
1 p.
artikel
49 Editorial Board 2013
8 p. IFC-
1 p.
artikel
50 Editorial Board 2012
8 p. IFC-
1 p.
artikel
51 Editorial Board 2011
8 p. IFC-
1 p.
artikel
52 Efficient downlink scheduling with power boosting in mobile IEEE 802.16 networks Caretti, M.
2011
8 p. 1672-1683
12 p.
artikel
53 Efficient heuristics for energy-aware routing in networks with bundled links Lin, Gongqi
2013
8 p. 1774-1788
15 p.
artikel
54 Expected convergence properties of BGP Viswanathan, Ramesh
2011
8 p. 1957-1981
25 p.
artikel
55 Finite-source M / M / S retrial queue with search for balking and impatient customers from the orbit Wüchner, Patrick
2009
8 p. 1264-1273
10 p.
artikel
56 Flow-level performance of proportional fairness with hierarchical modulation in OFDMA-based networks Jdidi, Anis
2011
8 p. 1784-1793
10 p.
artikel
57 Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link Weber, Steven
2007
8 p. 1981-1997
17 p.
artikel
58 Free-scaling your data center Gyarmati, László
2013
8 p. 1758-1773
16 p.
artikel
59 Fuzzy-based load self-configuration in mobile P2P services Macedo, Daniel F.
2011
8 p. 1834-1848
15 p.
artikel
60 Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm Galluccio, Laura
2007
8 p. 1998-2014
17 p.
artikel
61 Graption: A graph-based P2P traffic classification framework for the internet backbone Iliofotou, Marios
2011
8 p. 1909-1920
12 p.
artikel
62 Group registration with distributed databases for location tracking in 3G wireless networks Vergados, Dimitrios D.
2008
8 p. 1521-1544
24 p.
artikel
63 HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency Li, Zhichun
2010
8 p. 1282-1299
18 p.
artikel
64 Impact analysis of BGP sessions for prioritization of maintenance operations Lee, Sihyung
2012
8 p. 2206-2220
15 p.
artikel
65 Improving the efficiency of multipath traffic via opportunistic traffic scheduling Cetinkaya, Coskun
2007
8 p. 2181-2197
17 p.
artikel
66 Independent links: A new approach to increase spatial reuse in wireless networks Pires, Alexandre A.
2013
8 p. 1880-1893
14 p.
artikel
67 Indoor localization method based on RTT and AOA using coordinates clustering Dakkak, M.
2011
8 p. 1794-1803
10 p.
artikel
68 Insensitive load balancing in data networks Leino, J.
2006
8 p. 1059-1068
10 p.
artikel
69 Integrating SIP and IEEE 802.11e to support handoff and multi-grade QoS for VoIP-over-WLAN applications Chen, Jen-Jee
2011
8 p. 1719-1734
16 p.
artikel
70 Integrity protecting hierarchical concealed data aggregation for wireless sensor networks Ozdemir, Suat
2011
8 p. 1735-1746
12 p.
artikel
71 Internet security architecture Molva, Refik
1999
8 p. 787-804
18 p.
artikel
72 Intrusion detection using neural based hybrid classification methods Govindarajan, M.
2011
8 p. 1662-1671
10 p.
artikel
73 Investigation of the M 2 / G 2 / 1 / ∞ , N queue with restricted admission of priority customers and its application to HSDPA mobile systems Al-Begain, Khalid
2009
8 p. 1186-1201
16 p.
artikel
74 Leveraging network performance with IPv6 multihoming and multiple provider-dependent aggregatable prefixes de Launois, Cédric
2006
8 p. 1145-1157
13 p.
artikel
75 Loop-free alternates and not-via addresses: A proper combination for IP fast reroute? Menth, Michael
2010
8 p. 1300-1315
16 p.
artikel
76 Lowering security overhead in link state routing 1 An earlier version of this paper [19] was presented at the ISOC (Symposium on Network and Distributed System Security), February 1997, San Diego, CA, USA. 1 Hauser, Ralf
1999
8 p. 885-894
10 p.
artikel
77 MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems Yang, Shengbo
2013
8 p. 1805-1820
16 p.
artikel
78 Network survivability modeling Heegaard, Poul E.
2009
8 p. 1215-1234
20 p.
artikel
79 Novel association control strategies for multicasting in relay-enabled WLANs Chin, Kwan-Wu
2012
8 p. 2168-2178
11 p.
artikel
80 On the behavior of stable subnetworks in non-ergodic networks with unreliable nodes Mylosz, J.
2009
8 p. 1249-1263
15 p.
artikel
81 On the design of mobility management scheme for 802.16-based network environment Yang, Chun-Chuan
2007
8 p. 2049-2066
18 p.
artikel
82 On the design of reliable wireless mesh network infrastructure with QoS constraints Benyamina, D.
2011
8 p. 1631-1647
17 p.
artikel
83 On the design of resilient heterogeneous wireless sensor networks based on small world concepts Guidoni, Daniel L.
2010
8 p. 1266-1281
16 p.
artikel
84 On the effects of the packet size distribution on FEC performance Dán, György
2006
8 p. 1104-1129
26 p.
artikel
85 On the optimal, fair and channel-aware cognitive radio network reconfiguration Arkoulis, Stamatios
2013
8 p. 1739-1757
19 p.
artikel
86 On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks Manoj, B.S.
2007
8 p. 2126-2143
18 p.
artikel
87 Operating point selection for primary and secondary users in cognitive radio networks Gelabert, Xavier
2009
8 p. 1158-1170
13 p.
artikel
88 Optimal configuration of an optical network providing predefined multicast transmissions Reinhard, Vincent
2012
8 p. 2097-2106
10 p.
artikel
89 Optimal threshold control by the robots of web search engines with obsolescence of documents Avrachenkov, Konstantin
2011
8 p. 1880-1893
14 p.
artikel
90 Packet forwarding with source verification Shue, Craig A.
2008
8 p. 1567-1582
16 p.
artikel
91 Performance analysis of a delay tolerant application for herd localization Dopico, Nelson I.
2011
8 p. 1770-1783
14 p.
artikel
92 Performance analysis of the AntNet algorithm Dhillon, S.S.
2007
8 p. 2104-2125
22 p.
artikel
93 Performance evaluations of ZigBee in different smart grid environments Bilgin, B.E.
2012
8 p. 2196-2205
10 p.
artikel
94 ”Performance Modeling of Computer Networks: Special Issue in Memory of Dr. Gunter Bolch” (Eulogies and Editorials) 2009
8 p. 1155-1157
3 p.
artikel
95 Per-station throughput fairness in a WLAN hot-spot with TCP traffic Detti, A.
2011
8 p. 1820-1833
14 p.
artikel
96 Proportional and double imitation rules for spectrum access in cognitive radio networks Iellamo, Stefano
2013
8 p. 1863-1879
17 p.
artikel
97 Q-MEHROM: Mobility support and resource reservations for mobile senders and receivers Peters, Liesbeth
2006
8 p. 1158-1175
18 p.
artikel
98 QoS-aware game-theoretic rate & power control for CDMA wireless communication networks Bacci, Giacomo
2013
8 p. 1789-1804
16 p.
artikel
99 QoS-aware MAC protocols for wireless sensor networks: A survey Yigitel, M. Aykut
2011
8 p. 1982-2004
23 p.
artikel
100 QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future Kim, Hwangnam
2007
8 p. 1922-1941
20 p.
artikel
101 Queen-MAC: A quorum-based energy-efficient medium access control protocol for wireless sensor networks Ekbatanifard, GholamHossein
2012
8 p. 2221-2236
16 p.
artikel
102 Rate adaptation with joint receive diversity and power control for cognitive radio networks Wang, Jui Teng
2011
8 p. 1711-1718
8 p.
artikel
103 Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines Sterbenz, James P.G.
2010
8 p. 1245-1265
21 p.
artikel
104 Resilient and survivable networks Plattner, Bernhard
2010
8 p. 1243-1244
2 p.
artikel
105 Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol Carofiglio, Giovanna
2013
8 p. 1838-1852
15 p.
artikel
106 SAM-MAC: An efficient channel assignment scheme for multi-channel ad hoc networks Huang, Rongsheng
2008
8 p. 1634-1646
13 p.
artikel
107 Selected papers from the 3rd international workshop on QoS in multiservice IP networks (QoS-IP 2005) Bianchi, Giuseppe
2006
8 p. 1023-1025
3 p.
artikel
108 Self-prevention of socket buffer overflow Choi, Jin-Hee
2007
8 p. 1942-1954
13 p.
artikel
109 Solution for the broadcasting in the Kademlia peer-to-peer overlay Czirkos, Zoltán
2013
8 p. 1853-1862
10 p.
artikel
110 Stochastic and deterministic performance evaluation of automotive CAN communication Herpel, Thomas
2009
8 p. 1171-1185
15 p.
artikel
111 The “Global-ISP” paradigm Cohen, Reuven
2007
8 p. 1908-1921
14 p.
artikel
112 The modeling power of CINSim: Performance evaluation of interconnection networks Lüdtke, D.
2009
8 p. 1274-1288
15 p.
artikel
113 The nature of a useable PKI Ellison, Carl M
1999
8 p. 823-830
8 p.
artikel
114 Towards a platform for wide-area overlay network deployment and management MacLarty, Glen
2007
8 p. 2144-2162
19 p.
artikel
115 Towards a taxonomy of intrusion-detection systems Debar, Hervé
1999
8 p. 805-822
18 p.
artikel
116 Tree based dynamic address autoconfiguration in mobile ad hoc networks Al-Mistarihi, Mamoun F.
2011
8 p. 1894-1908
15 p.
artikel
117 Untraceable mobility or how to travel incognito 1 An earlier version of this paper was presented at IEEE Workshop on Mobile Systems and Applications [22]. 1 Ateniese, Giuseppe
1999
8 p. 871-884
14 p.
artikel
118 Upgrading unicast nodes to multicast-capable nodes in all-optical networks Chan, Tony K.C.
2011
8 p. 2005-2021
17 p.
artikel
119 User-level satisfaction aware end-to-end rate control in communication networks Roh, Hee-Tae
2011
8 p. 1700-1710
11 p.
artikel
120 Why TCP timers (still) don’t work well Psaras, Ioannis
2007
8 p. 2033-2048
16 p.
artikel
                             120 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland