nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds
|
Ghafouri, Robabeh |
|
2018 |
12 |
1 |
p. 241-268 |
artikel |
2 |
Ad-hoc messaging infrastructure for peer-to-peer communication
|
Lescisin, Michael |
|
2017 |
12 |
1 |
p. 60-73 |
artikel |
3 |
A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks
|
Rahimi, Saeideh |
|
2018 |
12 |
1 |
p. 88-101 |
artikel |
4 |
A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks
|
Nikravan, Mohammad |
|
2018 |
12 |
1 |
p. 209-226 |
artikel |
5 |
An approach of robust power control for cognitive radio networks based on chance constraints
|
Zhao, Zhiwei |
|
2018 |
12 |
1 |
p. 280-290 |
artikel |
6 |
An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks
|
Zahedi, Abdulhamid |
|
2018 |
12 |
1 |
p. 167-176 |
artikel |
7 |
Cooperative channel allocation and scheduling in multi-interface wireless mesh networks
|
Deng, Xiaoheng |
|
2017 |
12 |
1 |
p. 1-12 |
artikel |
8 |
Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks
|
Nikravan, Mohammad |
|
2018 |
12 |
1 |
p. 227 |
artikel |
9 |
Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach
|
Das, Santosh Kumar |
|
2018 |
12 |
1 |
p. 102-128 |
artikel |
10 |
GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities
|
Cazarotto, Paulo Henrique |
|
2017 |
12 |
1 |
p. 13-31 |
artikel |
11 |
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
|
Adavoudi-Jolfaei, AmirHosein |
|
2017 |
12 |
1 |
p. 43-59 |
artikel |
12 |
Localized topology control and on-demand power-efficient routing for wireless ad hoc and sensor networks
|
Qin, Xu |
|
2018 |
12 |
1 |
p. 189-208 |
artikel |
13 |
MiFo: A novel edge network integration framework for fog computing
|
Wang, Desheng |
|
2018 |
12 |
1 |
p. 269-279 |
artikel |
14 |
PCLNC: A low-cost intra-generation network coding strategy for P2P content distribution
|
Su, Junjie |
|
2018 |
12 |
1 |
p. 177-188 |
artikel |
15 |
Resource allocation algorithm with worst case delay guarantees in energy harvesting body area networks
|
Wu, Guangyuan |
|
2018 |
12 |
1 |
p. 74-87 |
artikel |
16 |
Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm
|
Asghari, Saied |
|
2018 |
12 |
1 |
p. 129-142 |
artikel |
17 |
Secure and efficient encrypted keyword search for multi-user setting in cloud computing
|
Wang, Haijiang |
|
2017 |
12 |
1 |
p. 32-42 |
artikel |
18 |
Sidelobe interference reduced scheduling algorithm for mmWave device-to-device communication networks
|
Wang, Lei |
|
2018 |
12 |
1 |
p. 228-240 |
artikel |
19 |
Weight distribution and community reconstitution based on communities communications in social opportunistic networks
|
Wu, Jia |
|
2018 |
12 |
1 |
p. 158-166 |
artikel |
20 |
XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication
|
Srinivasan, Avinash |
|
2018 |
12 |
1 |
p. 143-157 |
artikel |