Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             120 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Active tracking in mobile networks: An in-depth view Ficek, Michal
2013
9 p. 1936-1954
19 p.
artikel
2 A distributed architecture for scalable private RFID tag identification Solanas, Agusti
2007
9 p. 2268-2279
12 p.
artikel
3 Advanced multicast class-based bandwidth over-provisioning Logota, Evariste
2013
9 p. 2075-2092
18 p.
artikel
4 Advances in network smart cards authentication Torres, Joaquin
2007
9 p. 2249-2261
13 p.
artikel
5 Advances in smart cards Domingo-Ferrer, Josep
2007
9 p. 2219-2222
4 p.
artikel
6 A fair cooperative content-sharing service Militano, L.
2013
9 p. 1955-1973
19 p.
artikel
7 A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs Ahmadinejad, Seyed Hossein
2011
9 p. 2221-2240
20 p.
artikel
8 A model based approach for improving router geolocation Laki, S.
2010
9 p. 1490-1501
12 p.
artikel
9 An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games Chan, Mo-Che
2008
9 p. 1838-1845
8 p.
artikel
10 An efficient user authentication and key exchange protocol for mobile client–server environment Wu, Tsu-Yang
2010
9 p. 1520-1530
11 p.
artikel
11 An environment-aware mobility model for wireless ad hoc network Ahmed, Sabbir
2010
9 p. 1470-1489
20 p.
artikel
12 A network rate management protocol with TCP congestion control and fairness for all Rosberg, Zvi
2010
9 p. 1358-1374
17 p.
artikel
13 A new design for end-to-end proportional loss differentiation in IP networks Argibay-Losada, Pablo J.
2010
9 p. 1389-1403
15 p.
artikel
14 An online framework for catching top spreaders and scanners Shi, Xingang
2010
9 p. 1375-1388
14 p.
artikel
15 A novel path protection scheme for MPLS networks using multi-path routing Alouneh, Sahel
2009
9 p. 1530-1545
16 p.
artikel
16 A power control technique for anti-collision schemes in RFID systems Alsalih, Waleed
2013
9 p. 1991-2003
13 p.
artikel
17 A productivity-oriented methodology for local area network design in industrial environments Estepa, Rafael
2011
9 p. 2303-2314
12 p.
artikel
18 A root cause analysis toolkit for TCP Siekkinen, Matti
2008
9 p. 1846-1858
13 p.
artikel
19 A survey of recent developments in cryptographic algorithms for smart cards Preneel, Bart
2007
9 p. 2223-2233
11 p.
artikel
20 A survey on MAC protocols in OSA networks Vamsi Krishna, T.
2009
9 p. 1377-1394
18 p.
artikel
21 A survivable DoS-resistant overlay network Bu, Tian
2006
9 p. 1281-1301
21 p.
artikel
22 A transmission control SCTP for real-time multimedia streaming Kim, Kyung-Hoe
2010
9 p. 1418-1425
8 p.
artikel
23 BiCo: Network operator-friendly P2P traffic control through bilateral cooperation with peers Lee, HyunYong
2011
9 p. 2023-2034
12 p.
artikel
24 Channel, capacity, and flow assignment in wireless mesh networks Ramamurthi, Vishwanath
2011
9 p. 2241-2258
18 p.
artikel
25 Characterization of the busy-hour traffic of IP networks based on their intrinsic features García-Dorado, José Luis
2011
9 p. 2111-2125
15 p.
artikel
26 Cloud monitoring: A survey Aceto, Giuseppe
2013
9 p. 2093-2115
23 p.
artikel
27 Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction Konstantopoulos, Charalampos
2008
9 p. 1797-1824
28 p.
artikel
28 Contents Continued 2009
9 p. II-
1 p.
artikel
29 Cost-efficient design for higher capacity hybrid wireless-optical broadband access network (WOBAN) Reaz, Abu (Sayeem)
2011
9 p. 2138-2149
12 p.
artikel
30 Cross-layer failure restoration of IP multicast with applications to IPTV Yuksel, M.
2011
9 p. 2329-2351
23 p.
artikel
31 Decentralized detection of global threshold crossings using aggregation trees Wuhib, Fetahi
2008
9 p. 1745-1761
17 p.
artikel
32 Delay-based TCP congestion avoidance: A network calculus interpretation and performance improvements Chen, Mingyu
2009
9 p. 1319-1340
22 p.
artikel
33 Design and performance analysis of the Real-Time HCCA scheduler for IEEE 802.11e WLANs Cicconetti, Claudio
2007
9 p. 2311-2325
15 p.
artikel
34 Detection and diagnosis of data inconsistency failures in wireless sensor networks Ssu, Kuo-Feng
2006
9 p. 1247-1260
14 p.
artikel
35 Differential evolution optimization applied to the wavelength converters placement problem in all optical networks Lezama, Fernando
2012
9 p. 2262-2275
14 p.
artikel
36 Discriminatory processor sharing queues with stationary ergodic service times and the performance of TCP in overload Altman, Eitan
2010
9 p. 1509-1519
11 p.
artikel
37 DTN support for news dissemination in an urban area Pham, Tuan-Minh
2012
9 p. 2276-2291
16 p.
artikel
38 Dynamic topologies for sustainable and energy efficient traffic routing Kist, Alexander A.
2011
9 p. 2271-2288
18 p.
artikel
39 ECO–ALOC: Energy-efficient resource allocation for cluster-based software routers Fragni, Carlo
2012
9 p. 2249-2261
13 p.
artikel
40 Editorial Board 2008
9 p. IFC-
1 p.
artikel
41 Editorial Board 2006
9 p. CO2-
1 p.
artikel
42 Editorial Board 2010
9 p. IFC-
1 p.
artikel
43 Editorial Board 2009
9 p. IFC-
1 p.
artikel
44 Editorial Board 2007
9 p. IFC-
1 p.
artikel
45 Editorial Board 2013
9 p. IFC-
1 p.
artikel
46 Editorial Board 2012
9 p. IFC-
1 p.
artikel
47 Editorial Board 2011
9 p. IFC-
1 p.
artikel
48 Efficient HMAC-based secure communication for VANETs Hu, Changhui
2012
9 p. 2292-2303
12 p.
artikel
49 Energy-aware traffic engineering: A routing-based distributed solution for connection-oriented IP networks Coiro, A.
2013
9 p. 2004-2020
17 p.
artikel
50 Energy-efficient opportunistic scheduling schemes in wireless networks Yoon, Sung-Guk
2011
9 p. 2168-2175
8 p.
artikel
51 Energy-efficient power/rate control and scheduling in hybrid TDMA/CDMA wireless sensor networks Shu, Tao
2009
9 p. 1395-1408
14 p.
artikel
52 Epidemic-based reliable and adaptive multicast for mobile ad hoc networks Ozkasap, Oznur
2009
9 p. 1409-1430
22 p.
artikel
53 Erratum to “Building a network-aware and load-balanced peer-to-peer system for range queries, COMNET, 56(8) 2012, 2148–2167” Joung, Yuh-Jzer
2012
9 p. 2316-
1 p.
artikel
54 FAD and SPA: End-to-end link-level loss rate inference without infrastructure Zhao, Yao
2009
9 p. 1303-1318
16 p.
artikel
55 Fairness issue and monitor-based algorithm in optical burst switching networks Li, Hailong
2006
9 p. 1384-1405
22 p.
artikel
56 Fast MIPv6 extensions supporting seamless multicast handovers Leoleis, Georgios A.
2007
9 p. 2379-2396
18 p.
artikel
57 Fight jamming with jamming – A game theoretic analysis of jamming attack in wireless networks and defense strategy Chen, Lin
2011
9 p. 2259-2270
12 p.
artikel
58 Finding the K highest-ranked answers in a distributed network Zeinalipour-Yazti, Demetrios
2009
9 p. 1431-1449
19 p.
artikel
59 Fluid-flow analysis of TCP Westwood with RED Chen, Jiwei
2006
9 p. 1302-1326
25 p.
artikel
60 Greener networking in a network virtualization environment Botero, Juan Felipe
2013
9 p. 2021-2039
19 p.
artikel
61 HB-MP: A further step in the HB-family of lightweight authentication protocols Munilla, J.
2007
9 p. 2262-2267
6 p.
artikel
62 HPC5: An efficient topology generation mechanism for Gnutella networks Chandra, Joydeep
2010
9 p. 1440-1459
20 p.
artikel
63 Hybrid TDMA with heuristic traffic shaping: An efficient bandwidth allocation approach for heavy loaded LANs Pallas, G.D.
2009
9 p. 1555-1566
12 p.
artikel
64 Impact of adverse network conditions on P2P-TV systems: Experimental evidence Alessandria, Eugenio
2011
9 p. 2035-2050
16 p.
artikel
65 iMST: A bandwidth-guaranteed topology control algorithm for TDMA-based ad hoc networks with sectorized antennas Ang, Chee-Wei
2008
9 p. 1675-1692
18 p.
artikel
66 Increasing revenues via adaptive filtering in wired/wireless networks De Angelis, Flavio
2006
9 p. 1261-1280
20 p.
artikel
67 Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN Ma, Hui
2008
9 p. 1703-1720
18 p.
artikel
68 Large scale probabilistic available bandwidth estimation Thouin, Frederic
2011
9 p. 2065-2078
14 p.
artikel
69 Load-aware multicast routing metrics in multi-radio multi-channel wireless mesh networks Li, Fangmin
2011
9 p. 2150-2167
18 p.
artikel
70 Load balancing in large-scale RFID systems Dong, Qunfeng
2008
9 p. 1782-1796
15 p.
artikel
71 Mobility label based network: Mobility support in label switched networks with multi-protocol BGP Berzin, Oleg
2008
9 p. 1732-1744
13 p.
artikel
72 Modeling bufferless packet-switching networks with packet dependencies Vega Rodrigo, Miguel de
2009
9 p. 1450-1466
17 p.
artikel
73 Multihop cellular networks: Technology and economics Li, Xue Jun
2008
9 p. 1825-1837
13 p.
artikel
74 MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks Bheemarjuna Reddy, T.
2006
9 p. 1349-1383
35 p.
artikel
75 Network awareness and dynamic routing: The ad hoc network case Paillassa, Beatrice
2011
9 p. 2315-2328
14 p.
artikel
76 Network lifetime optimization for wireless video sensor networks with network coding/ARQ hybrid adaptive error-control scheme Tan, Chong
2011
9 p. 2126-2137
12 p.
artikel
77 Network smart card review and analysis Lu, HongQian Karen
2007
9 p. 2234-2248
15 p.
artikel
78 On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode Pérez-Costa, Xavier
2007
9 p. 2326-2344
19 p.
artikel
79 On the capacity of multi-packet reception enabled multi-channel multi-interface wireless networks Guo, Ming-Fei
2010
9 p. 1426-1439
14 p.
artikel
80 On the design of network control and management plane Iqbal, Hammad
2011
9 p. 2079-2091
13 p.
artikel
81 On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem Ammari, Habib M.
2013
9 p. 1913-1935
23 p.
artikel
82 On the spatial properties of internet routes Mátray, Péter
2012
9 p. 2237-2248
12 p.
artikel
83 Opportunistic power saving algorithms for Ethernet devices Herrería-Alonso, Sergio
2011
9 p. 2051-2064
14 p.
artikel
84 Optimal node-selection algorithm for parallel download in overlay content-distribution networks Han, Seung Chul
2009
9 p. 1480-1496
17 p.
artikel
85 Optimizing revenue for bandwidth auctions over networks with time reservations Belzarena, Pablo
2011
9 p. 2289-2302
14 p.
artikel
86 Packet classification using diagonal-based tuple space search Lee, Fu-Yuan
2006
9 p. 1406-1423
18 p.
artikel
87 Pathbook: Cross-layer optimization for full-duplex wireless networks Fang, Xi
2013
9 p. 1895-1912
18 p.
artikel
88 Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals Vassis, D.
2007
9 p. 2345-2352
8 p.
artikel
89 PLR-based heuristic for backup path computation in MPLS networks Saidi, Mohand Yazid
2009
9 p. 1467-1479
13 p.
artikel
90 Price: Hybrid geographic and co-based forwarding in delay-tolerant networks Boc, Mathias
2011
9 p. 2352-2360
9 p.
artikel
91 Privacy-aware routing in sensor networks Wang, Haodong
2009
9 p. 1512-1529
18 p.
artikel
92 QoS scheduling of uplink resources in OFDMA networks Hosein, Patrick
2007
9 p. 2368-2378
11 p.
artikel
93 Realization strategies of dedicated path protection: A bandwidth cost perspective Babarczi, Péter
2013
9 p. 1974-1990
17 p.
artikel
94 Release-time-based multi-channel MAC protocol for wireless mesh networks Jeng, Andy An-Kai
2011
9 p. 2176-2195
20 p.
artikel
95 Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Karyotis, Vasileios
2007
9 p. 2397-2410
14 p.
artikel
96 Routing security scheme based on reputation evaluation in hierarchical ad hoc networks Yu, Yao
2010
9 p. 1460-1469
10 p.
artikel
97 Secure many-to-one symbol transmission for implementation on smart cards Sebé, Francesc
2007
9 p. 2299-2307
9 p.
artikel
98 Security enhancement of an IC-card-based remote login mechanism Cheng, Ting-Fang
2007
9 p. 2280-2287
8 p.
artikel
99 Self-adjustment of resource allocation for grid applications Batista, Daniel M.
2008
9 p. 1762-1781
20 p.
artikel
100 Selfishness, collusion and power of local search for the ADMs minimization problem Flammini, Michele
2008
9 p. 1721-1731
11 p.
artikel
101 SingBroad: A scheduling scheme for broadcasting continuous multimedia data over a single channel Chen, Yu-Wei
2009
9 p. 1546-1554
9 p.
artikel
102 Smart card-based agents for fair non-repudiation López, Andrés Marín
2007
9 p. 2288-2298
11 p.
artikel
103 Spectrum sharing in IEEE 802.11s wireless mesh networks Max, Sebastian
2007
9 p. 2353-2367
15 p.
artikel
104 Stochastic modelling of peer-assisted VoD streaming in managed networks Gramatikov, S.
2013
9 p. 2058-2074
17 p.
artikel
105 Taming the elephants: New TCP slow start Ha, Sangtae
2011
9 p. 2092-2110
19 p.
artikel
106 The critical-square-grid coverage problem in wireless sensor networks is NP-Complete Ke, Wei-Chieh
2011
9 p. 2209-2220
12 p.
artikel
107 The parallel optimization of network bandwidth allocation based on generalized particle model Shuai, Dianxun
2006
9 p. 1219-1246
28 p.
artikel
108 Topics in wireless broadband systems Karetsos, George
2007
9 p. 2308-2310
3 p.
artikel
109 Toward an efficient and scalable feature selection approach for internet traffic classification Fahad, Adil
2013
9 p. 2040-2057
18 p.
artikel
110 Traffic characterization of transport level reliable multicasting: Comparison of epidemic and feedback controlled loss recovery Özkasap, Öznur
2006
9 p. 1193-1218
26 p.
artikel
111 Trends in the development of communication networks: Cognitive networks Fortuna, Carolina
2009
9 p. 1354-1376
23 p.
artikel
112 Understanding data center network architectures in virtualized environments: A view from multi-tier applications Zhang, Yueping
2011
9 p. 2196-2208
13 p.
artikel
113 User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks Shi, Minghui
2008
9 p. 1693-1702
10 p.
artikel
114 Using current web page structure to improve prefetching performance Domenech, Josep
2010
9 p. 1404-1417
14 p.
artikel
115 Using equivalence-checking to verify robustness to denial of service Lafrance, Stéphane
2006
9 p. 1327-1348
22 p.
artikel
116 Using Shared Risk Link Groups to enhance backup path computation Saidi, Mohand Yazid
2009
9 p. 1341-1353
13 p.
artikel
117 Using social networks to distort users’ profiles generated by web search engines Viejo, Alexandre
2010
9 p. 1343-1357
15 p.
artikel
118 Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels Liu, Zheng
2012
9 p. 2304-2315
12 p.
artikel
119 Virtual topology dynamics and handover mechanisms in Earth-fixed LEO satellite systems Korçak, Ömer
2009
9 p. 1497-1511
15 p.
artikel
120 Vulnerability analysis of RFID protocols for tag ownership transfer Peris-Lopez, Pedro
2010
9 p. 1502-1508
7 p.
artikel
                             120 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland