nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A channel-hopping scheme for continuous rendezvous and data delivery in cognitive radio network
|
Chen, Yen-Wen |
|
2014 |
9 |
1 |
p. 16-27 |
artikel |
2 |
A free rider aware topological construction strategy for search in unstructured P2P networks
|
Meng, Xianfu |
|
2014 |
9 |
1 |
p. 127-141 |
artikel |
3 |
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP
|
Zhang, Liping |
|
2014 |
9 |
1 |
p. 108-126 |
artikel |
4 |
An IP-TV P2P streaming system that improves the viewing quality and confines the startup delay of regular audience
|
Merani, Maria Luisa |
|
2014 |
9 |
1 |
p. 209-222 |
artikel |
5 |
A novel fairness-aware parallel download scheme
|
Kim, Eunhye |
|
2014 |
9 |
1 |
p. 42-53 |
artikel |
6 |
A scalable and automatic mechanism for resource allocation in self-organizing cloud
|
Wu, Xiaotong |
|
2014 |
9 |
1 |
p. 28-41 |
artikel |
7 |
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
|
Mishra, Dheerendra |
|
2014 |
9 |
1 |
p. 171-192 |
artikel |
8 |
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
|
Das, Ashok Kumar |
|
2014 |
9 |
1 |
p. 223-244 |
artikel |
9 |
CAPS: A cloud-assisted approach to handle spikes in peer-to-peer web search
|
Haridas, Harisankar |
|
2014 |
9 |
1 |
p. 193-208 |
artikel |
10 |
Chance-constraint optimization of power control in cognitive radio networks
|
Liu, Zhixin |
|
2014 |
9 |
1 |
p. 245-253 |
artikel |
11 |
Characterizing peers communities and dynamics in a P2P live streaming system
|
Ferreira, Francisco Henrique |
|
2014 |
9 |
1 |
p. 1-15 |
artikel |
12 |
Erratum to: A comprehensive study of the resource discovery techniques in Peer-to-Peer networks
|
Jafari Navimipour, Nima |
|
2015 |
9 |
1 |
p. 254 |
artikel |
13 |
Immersive voice communication for massively multiplayer online games
|
Jiang, Jehn-Ruey |
|
2014 |
9 |
1 |
p. 54-66 |
artikel |
14 |
NetSecCC: A scalable and fault-tolerant architecture for cloud computing security
|
He, Jin |
|
2014 |
9 |
1 |
p. 67-81 |
artikel |
15 |
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
|
Farash, Mohammad Sabzinejad |
|
2014 |
9 |
1 |
p. 82-91 |
artikel |
16 |
TEA-CBRP: Distributed cluster head election in MANET by using AHP
|
Venkanna, U. |
|
2014 |
9 |
1 |
p. 159-170 |
artikel |
17 |
Towards bandwidth-efficient keyword continuous query processing over DHTs
|
Zhu, Yingwu |
|
2014 |
9 |
1 |
p. 142-158 |
artikel |
18 |
Tree-based data retrieval algorithm for multi-item request with deadline in wireless networks
|
He, Ping |
|
2014 |
9 |
1 |
p. 92-107 |
artikel |