Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             187 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accelerating network security services with fast packet classification Shieh, Shiuhpyng
2004
16 p. 1637-1646
10 p.
artikel
2 Adaptive bandwidth provisioning with explicit respect to QoS requirements Tran, Hung Tuan
2005
16 p. 1862-1876
15 p.
artikel
3 Adaptive prediction based approach for congestion estimation (APACE) in active queue management Jain, Abhishek
2004
16 p. 1647-1660
14 p.
artikel
4 Adaptive rate allocation and resource planning for service level agreement maintenance in satellite communications Marchese, Mario
2007
16 p. 3179-3192
14 p.
artikel
5 ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information Iliadis, John
2003
16 p. 1851-1862
12 p.
artikel
6 A fast and scalable IPv4 and 6 address lookup algorithm Leu, Seiven
2006
16 p. 3020-3036
17 p.
artikel
7 A framework for seamless service interworking in ad-hoc networks Källström, Linda
2006
16 p. 3277-3294
18 p.
artikel
8 A fully distributed node allocation scheme with partition protection for Mobile Ad Hoc Networks Wang, Ting
2010
16 p. 1949-1960
12 p.
artikel
9 A general call admission policy for next generation wireless networks Beigy, Hamid
2005
16 p. 1798-1813
16 p.
artikel
10 Aggregated bandwidth allocation: investigation of performance of classical constrained and genetic algorithm based optimisation techniques Pitsillides, A.
2002
16 p. 1443-1453
11 p.
artikel
11 A heuristic algorithm for shared segment protection in mesh WDM networks with limited backup path/segments length Luo, Hongbin
2006
16 p. 3197-3213
17 p.
artikel
12 A hybrid view of mobility in MANETs: Analytical models and simulation study Wu, Xianren
2008
16 p. 3810-3821
12 p.
artikel
13 ALM: An adaptive location management scheme for approximate location queries in wireless sensor networks Yeh, Lo-Yao
2010
16 p. 1937-1948
12 p.
artikel
14 An adaptive mobility anchor point selection scheme in Hierarchical Mobile IPv6 networks Pack, Sangheon
2006
16 p. 3066-3078
13 p.
artikel
15 An agent based congestion control and notification scheme for TCP over ABR Djemame, K
2000
16 p. 1524-1536
13 p.
artikel
16 Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters Tsai, Pan-Lung
2006
16 p. 3170-3181
12 p.
artikel
17 Analysis of channel utilization for controller area networks Luis Sevillano, José
1998
16 p. 1446-1451
6 p.
artikel
18 Analysis of efficient and fair explicit congestion control protocol with feedback delay: Stability and convergence Wu, Hangxing
2010
16 p. 1992-2000
9 p.
artikel
19 Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations Javanmard, Adel
2009
16 p. 1768-1780
13 p.
artikel
20 Analyzing the effective throughput in multi-hop IEEE 802.11n networks Frohn, Simon
2011
16 p. 1912-1921
10 p.
artikel
21 An approach to achieve scalability through a structured peer-to-peer network for massively multiplayer online role playing games Jiang, Xinbo
2007
16 p. 3075-3084
10 p.
artikel
22 An efficient location management scheme based on replication strategy for intersystem roaming in mobile wireless networks Lee, HyeJeong
2006
16 p. 3238-3249
12 p.
artikel
23 An emulation tool for PlanetLab Carbone, Marta
2011
16 p. 1980-1990
11 p.
artikel
24 An encounter-based multicast scheme for disruption tolerant networks Xi, Yong
2009
16 p. 1742-1756
15 p.
artikel
25 An end-to-end flow control approach based on round trip time Chen, Jin-Ru
2000
16 p. 1537-1547
11 p.
artikel
26 An enhanced QoS CBT multicast routing protocol based on Genetic Algorithm in a hybrid HAP–Satellite system De Rango, Floriano
2007
16 p. 3126-3143
18 p.
artikel
27 An entropy-constrained algorithm for routing of communication networks Karayiannis, Nicolaos B.
2006
16 p. 3182-3196
15 p.
artikel
28 A new dynamic bandwidth allocation scheme for MPEG videos in ATM networks Chen, Chin-Ling
2000
16 p. 1505-1513
9 p.
artikel
29 A new efficient solution for QoS support in all optical metropolitan area networks Chaitou, Mohamad
2006
16 p. 3135-3147
13 p.
artikel
30 An extensive study of slotted Aloha-based RFID anti-collision protocols Namboodiri, Vinod
2012
16 p. 1955-1966
12 p.
artikel
31 An hybrid explicit multicast/recursive unicast approach for multicast routing Boudani, Ali
2005
16 p. 1814-1834
21 p.
artikel
32 An integrated approach with feedback control for robust Web QoS design Zhou, Xiaobo
2006
16 p. 3158-3169
12 p.
artikel
33 An intelligent routing and CAC framework for large-scale networks based on cooperative agents Barolli, Leonard
2002
16 p. 1429-1442
14 p.
artikel
34 An Internet application for on-line banking Leong, S.K.
1998
16 p. 1534-1540
7 p.
artikel
35 An investigation into supporting collaboration over the Internet Shah, Dipan
1998
16 p. 1458-1466
9 p.
artikel
36 An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks Chen, Huan
2007
16 p. 3055-3062
8 p.
artikel
37 Anomaly detection methods in wired networks: a survey and taxonomy Estevez-Tapiador, Juan M.
2004
16 p. 1569-1584
16 p.
artikel
38 An optimal cache algorithm for streaming VBR video over a heterogeneous network Chang, Shin-Hung
2005
16 p. 1852-1861
10 p.
artikel
39 An OVSF code assignment scheme utilizing multiple RAKE combiners for W-CDMA Yen, Li-Hsing
2004
16 p. 1617-1623
7 p.
artikel
40 An SPT-based topology control algorithm for wireless ad hoc networks Wang, Szu-Chi
2006
16 p. 3092-3103
12 p.
artikel
41 A scalable IPv6 route lookup scheme via dynamic variable-stride bitmap compression and path compression Zheng, Kai
2006
16 p. 3037-3050
14 p.
artikel
42 A simulation-based performance evaluation of Tahoe, Reno and Sack TCP as appropriate transport protocols for SIP Lulling, M.
2004
16 p. 1585-1593
9 p.
artikel
43 A study of traffic, user behavior and pricing policies in a large campus network Wang, Jessie Hui
2011
16 p. 1922-1931
10 p.
artikel
44 A survey of active and passive indoor localisation systems Deak, Gabriel
2012
16 p. 1939-1954
16 p.
artikel
45 A taxonomy of multicast protocols for Internet applications Mostafa, Walid
1998
16 p. 1448-1457
10 p.
artikel
46 A unified approach to traffic control strategy in integrated broadband networks 1 This work is based in part on a Ph.D thesis at the University of New South Wales, Australia [20]. 1 Au, T.Andrew
1998
16 p. 1401-1419
19 p.
artikel
47 Author index 1998
16 p. 1548-1549
2 p.
artikel
48 Breaking network security based on synchronized chaos Álvarez, Gonzalo
2004
16 p. 1679-1681
3 p.
artikel
49 Calendar 1998
16 p. 1541-1544
4 p.
artikel
50 Call for Papers: Security on Wireless Ad Hoc Networks 2006
16 p. I-
1 p.
artikel
51 Call for papers: Sensor-Acuator Networks (SANETs) 2005
16 p. IV-
1 p.
artikel
52 Case studies of network designs with technology considerations Habib, Sami J.
2007
16 p. 3117-3125
9 p.
artikel
53 Characterizing and modeling the Internet Router-level topology – The hierarchical features and HIR model Zhang, Jun
2010
16 p. 2001-2011
11 p.
artikel
54 Computational intelligence in telecommunications networks Douligeris, Christos
2002
16 p. 1413-1414
2 p.
artikel
55 Construction of an optimal multicast tree for group communication in a cellular network using genetic algorithm Mala, C.
2006
16 p. 3306-3312
7 p.
artikel
56 Contact-based buffering for delay-tolerant ad hoc broadcasting Khelil, Abdelmajid
2007
16 p. 3144-3153
10 p.
artikel
57 Contents Continued 2007
16 p. I-
1 p.
artikel
58 Contents Continued 2006
16 p. IV-
1 p.
artikel
59 Coping with file formats on the Internet Costea, Ileana
1998
16 p. 1437-1447
11 p.
artikel
60 Cross-layer optimization for wireless mesh networks with smart antennas Yazdanpanah, Mina
2011
16 p. 1894-1911
18 p.
artikel
61 DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity Harras, Khaled A.
2009
16 p. 1687-1698
12 p.
artikel
62 Deep-Space Transport Protocol: A novel transport scheme for Space DTNs Papastergiou, Giorgos
2009
16 p. 1757-1767
11 p.
artikel
63 Delay-Jitter aware slot assignment for Real-Time applications in wireless multimedia ad hoc sensor networks Tao, Liqiang
2012
16 p. 1967-1982
16 p.
artikel
64 Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks Yigitel, M. Aykut
2011
16 p. 1991-2001
11 p.
artikel
65 Design and implementation of Dynamic Service Negotiation Protocol (DSNP) Chen, Jyh-Cheng
2006
16 p. 3250-3264
15 p.
artikel
66 Design of a peer-to-peer system for optimized content replication Caviglione, Luca
2007
16 p. 3107-3116
10 p.
artikel
67 Detecting Denial-of-Service attacks using the wavelet transform Hamdi, Mohamed
2007
16 p. 3203-3213
11 p.
artikel
68 Differentiated multi-layer integrated routing in IP over WDM networks Wei, Wei
2004
16 p. 1594-1607
14 p.
artikel
69 Discrete-time modeling for performance analysis of real-time services in IEEE 802.16 networks Chuang, Chia-Chuan
2010
16 p. 1928-1936
9 p.
artikel
70 Distributed algorithms for the constrained routing problem in computer networks Hung, Yung-Chen
1998
16 p. 1476-1485
10 p.
artikel
71 Dynamic and secure management of VPNs in IPv6 multi-domain scenarios Martínez Pérez, Gregorio
2006
16 p. 3122-3134
13 p.
artikel
72 Dynamic bandwidth reservation for label switched paths: An on-line predictive approach Anjali, T.
2006
16 p. 3265-3276
12 p.
artikel
73 Editorial Board 2008
16 p. IFC-
1 p.
artikel
74 Editorial Board 2003
16 p. IFC-
1 p.
artikel
75 Editorial for the LTE special section Niemi, Valtteri
2010
16 p. 1893-
1 p.
artikel
76 Effective load for flow-level performance modelling of file transfers in wireless LANs Hoekstra, G.J.
2010
16 p. 1972-1981
10 p.
artikel
77 Energy-efficient scheduling with delay constraints for wireless sensor networks: A calculus-based perspective Zhang, Haitao
2012
16 p. 1983-1993
11 p.
artikel
78 Enhancing SCTP loss recovery: An experimental evaluation of early retransmit Hurtig, Per
2008
16 p. 3778-3788
11 p.
artikel
79 Establishing and managing trust within the public key infrastructure Lekkas, Dimitrios
2003
16 p. 1815-1825
11 p.
artikel
80 Estimation of network distances using off-line measurements Sinha, Prasun
2006
16 p. 3295-3305
11 p.
artikel
81 Evaluating IPv6 on a large-scale network Shiau, Wen-Lung
2006
16 p. 3113-3121
9 p.
artikel
82 Evaluation of management functionality for the power control operation of WLAN systems Oikonomou, A.
2004
16 p. 1670-1678
9 p.
artikel
83 Evaluation of network traffic workload scaling techniques Sleurs, K.
2007
16 p. 3096-3106
11 p.
artikel
84 Evaluation of the effect of SSL overhead in the performance of e-business servers operating in B2B scenarios García, Daniel F.
2007
16 p. 3063-3074
12 p.
artikel
85 Experiences of using a PKI to access a hospital information system by high street opticians Chadwick, David W
2003
16 p. 1893-1903
11 p.
artikel
86 Extension headers for IPv6 anycast Lin, Ching-Yu
2006
16 p. 3013-3019
7 p.
artikel
87 Fair resource allocation in peer-to-peer networks (extended version) Eger, Kolja
2007
16 p. 3046-3054
9 p.
artikel
88 Flow-based fast handover for mobile IPv6 environment – implementation and analysis Viinikainen, Ari
2006
16 p. 3051-3065
15 p.
artikel
89 FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Ramachandran, Chandrasekar
2008
16 p. 3855-3869
15 p.
artikel
90 GORA: an algorithm for designing optical cross-connect nodes with improved dependability Mutafungwa, Edward
2002
16 p. 1454-1464
11 p.
artikel
91 Guest Editorial: Advances in Communication Networking Obaidat, Mohammad S.
2007
16 p. 2995-2999
5 p.
artikel
92 Guest editorial: Performance evaluation of communication networks Obaidat, Mohammad S.
2008
16 p. 3739-3740
2 p.
artikel
93 Hierarchical power management in disruption tolerant networks using traffic-aware optimization Jun, Hyewon
2009
16 p. 1710-1723
14 p.
artikel
94 High Speed Digital Transmission Networking Lin, T.-H.
2000
16 p. 1573-
1 p.
artikel
95 IFC - Editorial Board 2010
16 p. IFC-
1 p.
artikel
96 IFC - Editorial Board 2009
16 p. IFC-
1 p.
artikel
97 IFC Editorial Board 2007
16 p. IFC-
1 p.
artikel
98 IFC Editorial Board 2006
16 p. CO2-
1 p.
artikel
99 IFC - Editorial Board 2011
16 p. IFC-
1 p.
artikel
100 IFC - Editorial Board 2012
16 p. IFC-
1 p.
artikel
101 IFC Editorial Board - top half 2005
16 p. CO2-
1 p.
artikel
102 IFC Editorial Board - top half 2004
16 p. IFC-
1 p.
artikel
103 Implementation of an IPv6 multicast firewall testbed Yoo, Kyeong
2006
16 p. 3079-3091
13 p.
artikel
104 Improving search efficiency using Bloom filters in partially connected ad hoc networks: A node-centric analysis Yuen, Wing Ho
2007
16 p. 3000-3011
12 p.
artikel
105 Index to volume 20 (1997/98) 1998
16 p. 1545-1547
3 p.
artikel
106 India network—the first case study of a virtual community Rao, K.V.
1998
16 p. 1527-1533
7 p.
artikel
107 Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis Boudriga, Noureddine
2008
16 p. 3752-3759
8 p.
artikel
108 Interference-aware routing for multi-hop Wireless Mesh Networks Alotaibi, Eiman
2010
16 p. 1961-1971
11 p.
artikel
109 Internet—services, facilities, protocols and architecture Hunt, Ray
1998
16 p. 1397-1411
15 p.
artikel
110 Internet: State-of-the-art Singh Hura, Gurdeep
1998
16 p. 1391-1396
6 p.
artikel
111 Introduction to the Special Section on Hot Topics in Mesh Networking Bruno, Raffaele
2011
16 p. 1893-
1 p.
artikel
112 IP multicast routing through ATM networks Smirnov, M.
1998
16 p. 1490-1501
12 p.
artikel
113 IPv6: More than protocol for next generation Internet Chen, Jiann-Liang
2006
16 p. 3011-3012
2 p.
artikel
114 Isochronous bandwidth utilization improvement in distributed queue dual bus-based personal communication networks Yang, Yibin
1998
16 p. 1420-1433
14 p.
artikel
115 Issues in improving TCP performance over ATM Afifi, Hossam
1998
16 p. 1434-1445
12 p.
artikel
116 Java hypermedia: on and beyond the world wide web Verhoeven, Antoon
1998
16 p. 1481-1489
9 p.
artikel
117 JAVA: network-centric enterprise computing Ashok, Swarnalatha
1998
16 p. 1467-1480
14 p.
artikel
118 Keyword index 1998
16 p. 1550-1557
8 p.
artikel
119 Load sharing in Call Server clusters Asif, Muhammad
2007
16 p. 3027-3045
19 p.
artikel
120 Location-based incentive pricing for tree-based relaying in multi-hop cellular networks Lo, Chi-Chun
2006
16 p. 3148-3157
10 p.
artikel
121 Location based services using geographical information systems Sadoun, Balqies
2007
16 p. 3154-3160
7 p.
artikel
122 LTE key management analysis with session keys context Forsberg, Dan
2010
16 p. 1907-1915
9 p.
artikel
123 LTE, the radio technology path towards 4G Rinne, M.
2010
16 p. 1894-1906
13 p.
artikel
124 Management and admission control based on policies and measurements for the packet-switched domain of the UMTS core network Georges, Mélissa
2006
16 p. 3214-3225
12 p.
artikel
125 Markov models of internet traffic and a new hierarchical MMPP model Muscariello, L.
2005
16 p. 1835-1851
17 p.
artikel
126 Media coding for the next generation mobile system LTE Järvinen, Kari
2010
16 p. 1916-1927
12 p.
artikel
127 Network resource brokerage by means of distributed agent-based systems encompassing reinforcement learning schemes Saltouros, M.
2002
16 p. 1415-1428
14 p.
artikel
128 Network system and world wide web security Soh, B.C.
1998
16 p. 1431-1433
3 p.
artikel
129 Non-repudiation protocols for multiple entities Onieva, Jose A.
2004
16 p. 1608-1616
9 p.
artikel
130 [No title] Zhu, Xiaomin
2006
16 p. 3338-3339
2 p.
artikel
131 Novel methods for the performance analysis of adaptive hybrid selective repeat ARQ Jianhua, H.
2000
16 p. 1548-1557
10 p.
artikel
132 OBC - Contents 2005
16 p. CO4-
1 p.
artikel
133 OBC - Contents 2007
16 p. OBC-
1 p.
artikel
134 OBC - Contents 2006
16 p. CO4-
1 p.
artikel
135 OLSR vs DSR: A comparative analysis of proactive and reactive mechanisms from an energetic point of view in wireless ad hoc networks Rango, Floriano De
2008
16 p. 3843-3854
12 p.
artikel
136 Online reconfiguration of channel assignment in Multi-Channel Multi-Radio wireless mesh networks Antony Franklin, A.
2012
16 p. 2004-2013
10 p.
artikel
137 On the implications of routing metric staleness in delay tolerant networks Wittie, Mike P.
2009
16 p. 1699-1709
11 p.
artikel
138 On the problem of capacity allocation and flow assignment in self-healing ATM networks Woungang, Isaac
2007
16 p. 3169-3178
10 p.
artikel
139 On traffic prediction for resource allocation: A Chebyshev bound based allocation scheme Garroppo, R.G.
2008
16 p. 3741-3751
11 p.
artikel
140 Optimal channel assignment in wireless communication networks with distance and frequency interferences Yue, Wuyi
2004
16 p. 1661-1669
9 p.
artikel
141 Optimal grouping of components in a distributed system Markopoulou, Athina P.
1998
16 p. 1452-1461
10 p.
artikel
142 Optimal network locality in distributed virtualized data-centers Leblet, Jimmy
2011
16 p. 1968-1979
12 p.
artikel
143 Optimising multi-rate link scheduling for wireless mesh networks Allen, Stuart M.
2012
16 p. 2014-2024
11 p.
artikel
144 Optimization of an eMule-like modifier strategy Caviglione, Luca
2008
16 p. 3876-3882
7 p.
artikel
145 Performance analyses of three geography-based location strategies for PCS networks Lai, Wei Kuang
2006
16 p. 3327-3337
11 p.
artikel
146 Performance analysis of a dynamic QoS scheme in optical label-switched networks Obaidat, Mohammad S.
2007
16 p. 3012-3026
15 p.
artikel
147 Performance analysis of probabilistic packet marking in IPv6 Dang, Xuan-Hien
2007
16 p. 3193-3202
10 p.
artikel
148 Performance comparison of different multicast routing strategies in disruption tolerant networks Ye, Qing
2009
16 p. 1731-1741
11 p.
artikel
149 Performance evaluation of minimum interference routing in network scenarios with protection requirements Marzo, Jose L.
2007
16 p. 3161-3168
8 p.
artikel
150 Performance evaluation of source extraction in wireless sensor networks Chen, Hong-Bin
2008
16 p. 3870-3875
6 p.
artikel
151 Performance evaluation of the context-aware handover mechanism for the nomadic mobile services in remote patient monitoring Pawar, Pravin
2008
16 p. 3831-3842
12 p.
artikel
152 Performance implications of fluctuating server capacity Luo, Jingxiang
2008
16 p. 3760-3770
11 p.
artikel
153 Privacy-enhancing technologies for the world wide web Oppliger, Rolf
2005
16 p. 1791-1797
7 p.
artikel
154 Protocols and architecture for managing TCP/IP network infrastructures King, A
2000
16 p. 1558-1572
15 p.
artikel
155 Realization of a secure active and programmable network infrastructure via mobile agent technology Karnouskos, Stamatis
2002
16 p. 1465-1476
12 p.
artikel
156 Recovery from control plane failures in the RSVP-TE signaling protocol Wu, Jing
2011
16 p. 1956-1967
12 p.
artikel
157 Reduced complexity algorithms for cognitive packet network routers Hey, Laurence A.
2008
16 p. 3822-3830
9 p.
artikel
158 Regulating the Internet: clutching at a straw? Endeshaw, Assafa
1998
16 p. 1519-1526
8 p.
artikel
159 Relay node placement in structurally damaged wireless sensor networks via triangular steiner tree approximation Senel, Fatih
2011
16 p. 1932-1941
10 p.
artikel
160 RelM: reliable multicast for mobile networks Brown, Kevin
1998
16 p. 1379-1400
22 p.
artikel
161 Replica placement in ring based content delivery networks Wauters, Tim
2006
16 p. 3313-3326
14 p.
artikel
162 Resource efficient logical topology design for IP-over-WDM backbone networks Tran, Phuong Nga
2008
16 p. 3771-3777
7 p.
artikel
163 RoVegas: a router-based congestion avoidance mechanism for TCP Vegas Chan, Yi-Cheng
2004
16 p. 1624-1636
13 p.
artikel
164 Scalable MPEG-4 streaming over the IPv6 mobile network environment Huang, Chung-Ming
2006
16 p. 3104-3112
9 p.
artikel
165 Scheduling and channel assignment algorithm for IEEE 802.16 mesh networks using clique partitioning technique Liao, Wen-Hwa
2012
16 p. 2025-2034
10 p.
artikel
166 Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy Lambrinoudakis, Costas
2003
16 p. 1873-1883
11 p.
artikel
167 Self-selecting reliable paths for wireless sensor network routing Babbitt, Thomas A.
2008
16 p. 3799-3809
11 p.
artikel
168 Simulation studies on router buffer sizing for short-lived and pacing TCP flows Hasegawa, Go
2008
16 p. 3789-3798
10 p.
artikel
169 SIP as a unified signalling solution in a beyond 3G system Nikas, Vaggelis
2006
16 p. 3226-3237
12 p.
artikel
170 Sniffer channel selection for monitoring wireless LANs Chen, Xian
2012
16 p. 1994-2003
10 p.
artikel
171 Spare capacity allocation and optimisation in a distributed GMPLS-based IP/WDM mesh network Harle, D.
2007
16 p. 3085-3095
11 p.
artikel
172 Special issue of computer communications on delay and disruption tolerant networking Cahill, Vinny
2009
16 p. 1685-1686
2 p.
artikel
173 Special issue: securing computer communications with Public Key Infrastructure Katsikas, Sokratis K.
2003
16 p. 1813-1814
2 p.
artikel
174 Survivable millimeter-wave mesh networks Jabbar, Abdul
2011
16 p. 1942-1955
14 p.
artikel
175 Temporal difference method-based multi-step ahead prediction of long term deep fading in mobile networks Gao, X.Z.
2002
16 p. 1477-1486
10 p.
artikel
176 The design and implementation of a session layer for delay-tolerant networks Demmer, Michael
2009
16 p. 1724-1730
7 p.
artikel
177 The GPKI developing status of Taiwan and some major Asia countries Lin, Chen-Chi
2003
16 p. 1884-1892
9 p.
artikel
178 The Internet: global information superhighway for the future Singh Hura, Gurdeep
1998
16 p. 1412-1430
19 p.
artikel
179 Throughput analysis of Non-Renegable Selective Acknowledgments (NR-SACKs) for SCTP Yilmaz, Ertugrul
2010
16 p. 1982-1991
10 p.
artikel
180 Towards a framework for evaluating certificate status information mechanisms Iliadis, John
2003
16 p. 1839-1850
12 p.
artikel
181 @Trust: A trust model based on feedback-arbitration in structured P2P network Meng, Xianfu
2012
16 p. 2044-2053
10 p.
artikel
182 UIO E : a protocol test sequence generation method using the transition executability analysis (TEA) Huang, Chung-Ming
1998
16 p. 1462-1475
14 p.
artikel
183 Using a privilege management infrastructure for secure web-based e-health applications Blobel, B.
2003
16 p. 1863-1872
10 p.
artikel
184 Using proxies to enhance TCP performance over hybrid fiber coaxial networks Cohen, Reuven
1998
16 p. 1502-1518
17 p.
artikel
185 Virtual certificates and synthetic certificates: new paradigms for improving public key validation Russell, Selwyn
2003
16 p. 1826-1838
13 p.
artikel
186 Virtual time scheduling in HFC networks with support for priority implementation Kamal, A.E
2000
16 p. 1514-1523
10 p.
artikel
187 Wavelength converter allocation considering the streamline effect in OBS networks Shan, Dong Mei
2012
16 p. 2035-2043
9 p.
artikel
                             187 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland