nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Active tracking in mobile networks: An in-depth view
|
Ficek, Michal |
|
2013 |
|
9 |
p. 1936-1954 19 p. |
artikel |
2 |
A distributed architecture for scalable private RFID tag identification
|
Solanas, Agusti |
|
2007 |
|
9 |
p. 2268-2279 12 p. |
artikel |
3 |
Advanced multicast class-based bandwidth over-provisioning
|
Logota, Evariste |
|
2013 |
|
9 |
p. 2075-2092 18 p. |
artikel |
4 |
Advances in network smart cards authentication
|
Torres, Joaquin |
|
2007 |
|
9 |
p. 2249-2261 13 p. |
artikel |
5 |
Advances in smart cards
|
Domingo-Ferrer, Josep |
|
2007 |
|
9 |
p. 2219-2222 4 p. |
artikel |
6 |
A fair cooperative content-sharing service
|
Militano, L. |
|
2013 |
|
9 |
p. 1955-1973 19 p. |
artikel |
7 |
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs
|
Ahmadinejad, Seyed Hossein |
|
2011 |
|
9 |
p. 2221-2240 20 p. |
artikel |
8 |
A model based approach for improving router geolocation
|
Laki, S. |
|
2010 |
|
9 |
p. 1490-1501 12 p. |
artikel |
9 |
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
|
Chan, Mo-Che |
|
2008 |
|
9 |
p. 1838-1845 8 p. |
artikel |
10 |
An efficient user authentication and key exchange protocol for mobile client–server environment
|
Wu, Tsu-Yang |
|
2010 |
|
9 |
p. 1520-1530 11 p. |
artikel |
11 |
An environment-aware mobility model for wireless ad hoc network
|
Ahmed, Sabbir |
|
2010 |
|
9 |
p. 1470-1489 20 p. |
artikel |
12 |
A network rate management protocol with TCP congestion control and fairness for all
|
Rosberg, Zvi |
|
2010 |
|
9 |
p. 1358-1374 17 p. |
artikel |
13 |
A new design for end-to-end proportional loss differentiation in IP networks
|
Argibay-Losada, Pablo J. |
|
2010 |
|
9 |
p. 1389-1403 15 p. |
artikel |
14 |
An online framework for catching top spreaders and scanners
|
Shi, Xingang |
|
2010 |
|
9 |
p. 1375-1388 14 p. |
artikel |
15 |
A novel path protection scheme for MPLS networks using multi-path routing
|
Alouneh, Sahel |
|
2009 |
|
9 |
p. 1530-1545 16 p. |
artikel |
16 |
A power control technique for anti-collision schemes in RFID systems
|
Alsalih, Waleed |
|
2013 |
|
9 |
p. 1991-2003 13 p. |
artikel |
17 |
A productivity-oriented methodology for local area network design in industrial environments
|
Estepa, Rafael |
|
2011 |
|
9 |
p. 2303-2314 12 p. |
artikel |
18 |
A root cause analysis toolkit for TCP
|
Siekkinen, Matti |
|
2008 |
|
9 |
p. 1846-1858 13 p. |
artikel |
19 |
A survey of recent developments in cryptographic algorithms for smart cards
|
Preneel, Bart |
|
2007 |
|
9 |
p. 2223-2233 11 p. |
artikel |
20 |
A survey on MAC protocols in OSA networks
|
Vamsi Krishna, T. |
|
2009 |
|
9 |
p. 1377-1394 18 p. |
artikel |
21 |
A survivable DoS-resistant overlay network
|
Bu, Tian |
|
2006 |
|
9 |
p. 1281-1301 21 p. |
artikel |
22 |
A transmission control SCTP for real-time multimedia streaming
|
Kim, Kyung-Hoe |
|
2010 |
|
9 |
p. 1418-1425 8 p. |
artikel |
23 |
BiCo: Network operator-friendly P2P traffic control through bilateral cooperation with peers
|
Lee, HyunYong |
|
2011 |
|
9 |
p. 2023-2034 12 p. |
artikel |
24 |
Channel, capacity, and flow assignment in wireless mesh networks
|
Ramamurthi, Vishwanath |
|
2011 |
|
9 |
p. 2241-2258 18 p. |
artikel |
25 |
Characterization of the busy-hour traffic of IP networks based on their intrinsic features
|
García-Dorado, José Luis |
|
2011 |
|
9 |
p. 2111-2125 15 p. |
artikel |
26 |
Cloud monitoring: A survey
|
Aceto, Giuseppe |
|
2013 |
|
9 |
p. 2093-2115 23 p. |
artikel |
27 |
Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction
|
Konstantopoulos, Charalampos |
|
2008 |
|
9 |
p. 1797-1824 28 p. |
artikel |
28 |
Contents Continued
|
|
|
2009 |
|
9 |
p. II- 1 p. |
artikel |
29 |
Cost-efficient design for higher capacity hybrid wireless-optical broadband access network (WOBAN)
|
Reaz, Abu (Sayeem) |
|
2011 |
|
9 |
p. 2138-2149 12 p. |
artikel |
30 |
Cross-layer failure restoration of IP multicast with applications to IPTV
|
Yuksel, M. |
|
2011 |
|
9 |
p. 2329-2351 23 p. |
artikel |
31 |
Decentralized detection of global threshold crossings using aggregation trees
|
Wuhib, Fetahi |
|
2008 |
|
9 |
p. 1745-1761 17 p. |
artikel |
32 |
Delay-based TCP congestion avoidance: A network calculus interpretation and performance improvements
|
Chen, Mingyu |
|
2009 |
|
9 |
p. 1319-1340 22 p. |
artikel |
33 |
Design and performance analysis of the Real-Time HCCA scheduler for IEEE 802.11e WLANs
|
Cicconetti, Claudio |
|
2007 |
|
9 |
p. 2311-2325 15 p. |
artikel |
34 |
Detection and diagnosis of data inconsistency failures in wireless sensor networks
|
Ssu, Kuo-Feng |
|
2006 |
|
9 |
p. 1247-1260 14 p. |
artikel |
35 |
Differential evolution optimization applied to the wavelength converters placement problem in all optical networks
|
Lezama, Fernando |
|
2012 |
|
9 |
p. 2262-2275 14 p. |
artikel |
36 |
Discriminatory processor sharing queues with stationary ergodic service times and the performance of TCP in overload
|
Altman, Eitan |
|
2010 |
|
9 |
p. 1509-1519 11 p. |
artikel |
37 |
DTN support for news dissemination in an urban area
|
Pham, Tuan-Minh |
|
2012 |
|
9 |
p. 2276-2291 16 p. |
artikel |
38 |
Dynamic topologies for sustainable and energy efficient traffic routing
|
Kist, Alexander A. |
|
2011 |
|
9 |
p. 2271-2288 18 p. |
artikel |
39 |
ECO–ALOC: Energy-efficient resource allocation for cluster-based software routers
|
Fragni, Carlo |
|
2012 |
|
9 |
p. 2249-2261 13 p. |
artikel |
40 |
Editorial Board
|
|
|
2008 |
|
9 |
p. IFC- 1 p. |
artikel |
41 |
Editorial Board
|
|
|
2006 |
|
9 |
p. CO2- 1 p. |
artikel |
42 |
Editorial Board
|
|
|
2010 |
|
9 |
p. IFC- 1 p. |
artikel |
43 |
Editorial Board
|
|
|
2009 |
|
9 |
p. IFC- 1 p. |
artikel |
44 |
Editorial Board
|
|
|
2007 |
|
9 |
p. IFC- 1 p. |
artikel |
45 |
Editorial Board
|
|
|
2013 |
|
9 |
p. IFC- 1 p. |
artikel |
46 |
Editorial Board
|
|
|
2012 |
|
9 |
p. IFC- 1 p. |
artikel |
47 |
Editorial Board
|
|
|
2011 |
|
9 |
p. IFC- 1 p. |
artikel |
48 |
Efficient HMAC-based secure communication for VANETs
|
Hu, Changhui |
|
2012 |
|
9 |
p. 2292-2303 12 p. |
artikel |
49 |
Energy-aware traffic engineering: A routing-based distributed solution for connection-oriented IP networks
|
Coiro, A. |
|
2013 |
|
9 |
p. 2004-2020 17 p. |
artikel |
50 |
Energy-efficient opportunistic scheduling schemes in wireless networks
|
Yoon, Sung-Guk |
|
2011 |
|
9 |
p. 2168-2175 8 p. |
artikel |
51 |
Energy-efficient power/rate control and scheduling in hybrid TDMA/CDMA wireless sensor networks
|
Shu, Tao |
|
2009 |
|
9 |
p. 1395-1408 14 p. |
artikel |
52 |
Epidemic-based reliable and adaptive multicast for mobile ad hoc networks
|
Ozkasap, Oznur |
|
2009 |
|
9 |
p. 1409-1430 22 p. |
artikel |
53 |
Erratum to “Building a network-aware and load-balanced peer-to-peer system for range queries, COMNET, 56(8) 2012, 2148–2167”
|
Joung, Yuh-Jzer |
|
2012 |
|
9 |
p. 2316- 1 p. |
artikel |
54 |
FAD and SPA: End-to-end link-level loss rate inference without infrastructure
|
Zhao, Yao |
|
2009 |
|
9 |
p. 1303-1318 16 p. |
artikel |
55 |
Fairness issue and monitor-based algorithm in optical burst switching networks
|
Li, Hailong |
|
2006 |
|
9 |
p. 1384-1405 22 p. |
artikel |
56 |
Fast MIPv6 extensions supporting seamless multicast handovers
|
Leoleis, Georgios A. |
|
2007 |
|
9 |
p. 2379-2396 18 p. |
artikel |
57 |
Fight jamming with jamming – A game theoretic analysis of jamming attack in wireless networks and defense strategy
|
Chen, Lin |
|
2011 |
|
9 |
p. 2259-2270 12 p. |
artikel |
58 |
Finding the K highest-ranked answers in a distributed network
|
Zeinalipour-Yazti, Demetrios |
|
2009 |
|
9 |
p. 1431-1449 19 p. |
artikel |
59 |
Fluid-flow analysis of TCP Westwood with RED
|
Chen, Jiwei |
|
2006 |
|
9 |
p. 1302-1326 25 p. |
artikel |
60 |
Greener networking in a network virtualization environment
|
Botero, Juan Felipe |
|
2013 |
|
9 |
p. 2021-2039 19 p. |
artikel |
61 |
HB-MP: A further step in the HB-family of lightweight authentication protocols
|
Munilla, J. |
|
2007 |
|
9 |
p. 2262-2267 6 p. |
artikel |
62 |
HPC5: An efficient topology generation mechanism for Gnutella networks
|
Chandra, Joydeep |
|
2010 |
|
9 |
p. 1440-1459 20 p. |
artikel |
63 |
Hybrid TDMA with heuristic traffic shaping: An efficient bandwidth allocation approach for heavy loaded LANs
|
Pallas, G.D. |
|
2009 |
|
9 |
p. 1555-1566 12 p. |
artikel |
64 |
Impact of adverse network conditions on P2P-TV systems: Experimental evidence
|
Alessandria, Eugenio |
|
2011 |
|
9 |
p. 2035-2050 16 p. |
artikel |
65 |
iMST: A bandwidth-guaranteed topology control algorithm for TDMA-based ad hoc networks with sectorized antennas
|
Ang, Chee-Wei |
|
2008 |
|
9 |
p. 1675-1692 18 p. |
artikel |
66 |
Increasing revenues via adaptive filtering in wired/wireless networks
|
De Angelis, Flavio |
|
2006 |
|
9 |
p. 1261-1280 20 p. |
artikel |
67 |
Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN
|
Ma, Hui |
|
2008 |
|
9 |
p. 1703-1720 18 p. |
artikel |
68 |
Large scale probabilistic available bandwidth estimation
|
Thouin, Frederic |
|
2011 |
|
9 |
p. 2065-2078 14 p. |
artikel |
69 |
Load-aware multicast routing metrics in multi-radio multi-channel wireless mesh networks
|
Li, Fangmin |
|
2011 |
|
9 |
p. 2150-2167 18 p. |
artikel |
70 |
Load balancing in large-scale RFID systems
|
Dong, Qunfeng |
|
2008 |
|
9 |
p. 1782-1796 15 p. |
artikel |
71 |
Mobility label based network: Mobility support in label switched networks with multi-protocol BGP
|
Berzin, Oleg |
|
2008 |
|
9 |
p. 1732-1744 13 p. |
artikel |
72 |
Modeling bufferless packet-switching networks with packet dependencies
|
Vega Rodrigo, Miguel de |
|
2009 |
|
9 |
p. 1450-1466 17 p. |
artikel |
73 |
Multihop cellular networks: Technology and economics
|
Li, Xue Jun |
|
2008 |
|
9 |
p. 1825-1837 13 p. |
artikel |
74 |
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
|
Bheemarjuna Reddy, T. |
|
2006 |
|
9 |
p. 1349-1383 35 p. |
artikel |
75 |
Network awareness and dynamic routing: The ad hoc network case
|
Paillassa, Beatrice |
|
2011 |
|
9 |
p. 2315-2328 14 p. |
artikel |
76 |
Network lifetime optimization for wireless video sensor networks with network coding/ARQ hybrid adaptive error-control scheme
|
Tan, Chong |
|
2011 |
|
9 |
p. 2126-2137 12 p. |
artikel |
77 |
Network smart card review and analysis
|
Lu, HongQian Karen |
|
2007 |
|
9 |
p. 2234-2248 15 p. |
artikel |
78 |
On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode
|
Pérez-Costa, Xavier |
|
2007 |
|
9 |
p. 2326-2344 19 p. |
artikel |
79 |
On the capacity of multi-packet reception enabled multi-channel multi-interface wireless networks
|
Guo, Ming-Fei |
|
2010 |
|
9 |
p. 1426-1439 14 p. |
artikel |
80 |
On the design of network control and management plane
|
Iqbal, Hammad |
|
2011 |
|
9 |
p. 2079-2091 13 p. |
artikel |
81 |
On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem
|
Ammari, Habib M. |
|
2013 |
|
9 |
p. 1913-1935 23 p. |
artikel |
82 |
On the spatial properties of internet routes
|
Mátray, Péter |
|
2012 |
|
9 |
p. 2237-2248 12 p. |
artikel |
83 |
Opportunistic power saving algorithms for Ethernet devices
|
Herrería-Alonso, Sergio |
|
2011 |
|
9 |
p. 2051-2064 14 p. |
artikel |
84 |
Optimal node-selection algorithm for parallel download in overlay content-distribution networks
|
Han, Seung Chul |
|
2009 |
|
9 |
p. 1480-1496 17 p. |
artikel |
85 |
Optimizing revenue for bandwidth auctions over networks with time reservations
|
Belzarena, Pablo |
|
2011 |
|
9 |
p. 2289-2302 14 p. |
artikel |
86 |
Packet classification using diagonal-based tuple space search
|
Lee, Fu-Yuan |
|
2006 |
|
9 |
p. 1406-1423 18 p. |
artikel |
87 |
Pathbook: Cross-layer optimization for full-duplex wireless networks
|
Fang, Xi |
|
2013 |
|
9 |
p. 1895-1912 18 p. |
artikel |
88 |
Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals
|
Vassis, D. |
|
2007 |
|
9 |
p. 2345-2352 8 p. |
artikel |
89 |
PLR-based heuristic for backup path computation in MPLS networks
|
Saidi, Mohand Yazid |
|
2009 |
|
9 |
p. 1467-1479 13 p. |
artikel |
90 |
Price: Hybrid geographic and co-based forwarding in delay-tolerant networks
|
Boc, Mathias |
|
2011 |
|
9 |
p. 2352-2360 9 p. |
artikel |
91 |
Privacy-aware routing in sensor networks
|
Wang, Haodong |
|
2009 |
|
9 |
p. 1512-1529 18 p. |
artikel |
92 |
QoS scheduling of uplink resources in OFDMA networks
|
Hosein, Patrick |
|
2007 |
|
9 |
p. 2368-2378 11 p. |
artikel |
93 |
Realization strategies of dedicated path protection: A bandwidth cost perspective
|
Babarczi, Péter |
|
2013 |
|
9 |
p. 1974-1990 17 p. |
artikel |
94 |
Release-time-based multi-channel MAC protocol for wireless mesh networks
|
Jeng, Andy An-Kai |
|
2011 |
|
9 |
p. 2176-2195 20 p. |
artikel |
95 |
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework
|
Karyotis, Vasileios |
|
2007 |
|
9 |
p. 2397-2410 14 p. |
artikel |
96 |
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
|
Yu, Yao |
|
2010 |
|
9 |
p. 1460-1469 10 p. |
artikel |
97 |
Secure many-to-one symbol transmission for implementation on smart cards
|
Sebé, Francesc |
|
2007 |
|
9 |
p. 2299-2307 9 p. |
artikel |
98 |
Security enhancement of an IC-card-based remote login mechanism
|
Cheng, Ting-Fang |
|
2007 |
|
9 |
p. 2280-2287 8 p. |
artikel |
99 |
Self-adjustment of resource allocation for grid applications
|
Batista, Daniel M. |
|
2008 |
|
9 |
p. 1762-1781 20 p. |
artikel |
100 |
Selfishness, collusion and power of local search for the ADMs minimization problem
|
Flammini, Michele |
|
2008 |
|
9 |
p. 1721-1731 11 p. |
artikel |
101 |
SingBroad: A scheduling scheme for broadcasting continuous multimedia data over a single channel
|
Chen, Yu-Wei |
|
2009 |
|
9 |
p. 1546-1554 9 p. |
artikel |
102 |
Smart card-based agents for fair non-repudiation
|
López, Andrés Marín |
|
2007 |
|
9 |
p. 2288-2298 11 p. |
artikel |
103 |
Spectrum sharing in IEEE 802.11s wireless mesh networks
|
Max, Sebastian |
|
2007 |
|
9 |
p. 2353-2367 15 p. |
artikel |
104 |
Stochastic modelling of peer-assisted VoD streaming in managed networks
|
Gramatikov, S. |
|
2013 |
|
9 |
p. 2058-2074 17 p. |
artikel |
105 |
Taming the elephants: New TCP slow start
|
Ha, Sangtae |
|
2011 |
|
9 |
p. 2092-2110 19 p. |
artikel |
106 |
The critical-square-grid coverage problem in wireless sensor networks is NP-Complete
|
Ke, Wei-Chieh |
|
2011 |
|
9 |
p. 2209-2220 12 p. |
artikel |
107 |
The parallel optimization of network bandwidth allocation based on generalized particle model
|
Shuai, Dianxun |
|
2006 |
|
9 |
p. 1219-1246 28 p. |
artikel |
108 |
Topics in wireless broadband systems
|
Karetsos, George |
|
2007 |
|
9 |
p. 2308-2310 3 p. |
artikel |
109 |
Toward an efficient and scalable feature selection approach for internet traffic classification
|
Fahad, Adil |
|
2013 |
|
9 |
p. 2040-2057 18 p. |
artikel |
110 |
Traffic characterization of transport level reliable multicasting: Comparison of epidemic and feedback controlled loss recovery
|
Özkasap, Öznur |
|
2006 |
|
9 |
p. 1193-1218 26 p. |
artikel |
111 |
Trends in the development of communication networks: Cognitive networks
|
Fortuna, Carolina |
|
2009 |
|
9 |
p. 1354-1376 23 p. |
artikel |
112 |
Understanding data center network architectures in virtualized environments: A view from multi-tier applications
|
Zhang, Yueping |
|
2011 |
|
9 |
p. 2196-2208 13 p. |
artikel |
113 |
User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks
|
Shi, Minghui |
|
2008 |
|
9 |
p. 1693-1702 10 p. |
artikel |
114 |
Using current web page structure to improve prefetching performance
|
Domenech, Josep |
|
2010 |
|
9 |
p. 1404-1417 14 p. |
artikel |
115 |
Using equivalence-checking to verify robustness to denial of service
|
Lafrance, Stéphane |
|
2006 |
|
9 |
p. 1327-1348 22 p. |
artikel |
116 |
Using Shared Risk Link Groups to enhance backup path computation
|
Saidi, Mohand Yazid |
|
2009 |
|
9 |
p. 1341-1353 13 p. |
artikel |
117 |
Using social networks to distort users’ profiles generated by web search engines
|
Viejo, Alexandre |
|
2010 |
|
9 |
p. 1343-1357 15 p. |
artikel |
118 |
Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels
|
Liu, Zheng |
|
2012 |
|
9 |
p. 2304-2315 12 p. |
artikel |
119 |
Virtual topology dynamics and handover mechanisms in Earth-fixed LEO satellite systems
|
Korçak, Ömer |
|
2009 |
|
9 |
p. 1497-1511 15 p. |
artikel |
120 |
Vulnerability analysis of RFID protocols for tag ownership transfer
|
Peris-Lopez, Pedro |
|
2010 |
|
9 |
p. 1502-1508 7 p. |
artikel |