Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             242 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A bio-inspired approach for streaming applications in wireless sensor networks based on the Lotka–Volterra competition model Antoniou, Pavlos
2010
17 p. 2039-2047
9 p.
artikel
2 A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks Quttoum, Ahmad Nahar
2010
17 p. 2070-2078
9 p.
artikel
3 A comparison of simulated traffic conditioner performance Strauss, Tinus
2008
17 p. 3933-3940
8 p.
artikel
4 A cooperative CDMA-based multi-channel MAC protocol for mobile ad hoc networks Moon, Yuhan
2009
17 p. 1810-1819
10 p.
artikel
5 Activity scheduling based on cross-layer information in Bluetooth sensor networks Mišić, Jelena
2006
17 p. 3385-3396
12 p.
artikel
6 Adaptive ad hoc self-organizing scheduling for quasi-periodic sensor network lifetime Visweswara, Sharat C.
2006
17 p. 3366-3384
19 p.
artikel
7 Adaptive online bandwidth allocation and reservation for QoS sensitive multimedia networks Kim, Sungwook
2005
17 p. 1959-1969
11 p.
artikel
8 Adaptive splitting and pre-signaling for RFID tag anti-collision Yeh, Ming-Kuei
2009
17 p. 1862-1870
9 p.
artikel
9 A directional data dissemination protocol for vehicular environments Schwartz, Ramon S.
2011
17 p. 2057-2071
15 p.
artikel
10 A distributed routing and wavelength assignment algorithm for real-time multicast in WDM networks Huang, Chuanhe
2002
17 p. 1527-1535
9 p.
artikel
11 Advanced security techniques for network protection Merabti, M.
2000
17 p. 1581-1583
3 p.
artikel
12 A fast algorithm for reliability-oriented task assignment in a distributed system Chiu, Chin-Ching
2002
17 p. 1622-1630
9 p.
artikel
13 A fault-tolerant architecture for ATM networks Lo, C.-C
1999
17 p. 1540-1548
9 p.
artikel
14 A framework for Resource-Aware Data Accumulation in sparse wireless sensor networks Shah, Kunal
2011
17 p. 2094-2103
10 p.
artikel
15 A genetic algorithm for solving dual-homing cell assignment problem of the two-level wireless ATM network Din, D.-R.
2002
17 p. 1536-1547
12 p.
artikel
16 A graph theoretic approach to ultrafast information distribution: Borel Cayley graph resizing algorithm Yu, Jaewook
2010
17 p. 2093-2104
12 p.
artikel
17 A hybrid meshed multipath forwarding scheme in wireless ad hoc networks De, Swades
2007
17 p. 3346-3357
12 p.
artikel
18 A hybrid open queuing network model approach for multi-threaded dataflow architecture Bhaskar, Vidhyacharan
2008
17 p. 4098-4106
9 p.
artikel
19 A hybrid QoS multicast framework-based protocol for wireless mesh networks Pourfakhar, Ehsan
2010
17 p. 2079-2092
14 p.
artikel
20 A lightweight identity authentication protocol for wireless networks Badra, Mohamad
2004
17 p. 1738-1745
8 p.
artikel
21 A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms Li, Yang
2008
17 p. 4018-4025
8 p.
artikel
22 A low-complexity bandwidth allocation algorithm for frequency-selective multiuser OFDM systems Papandreou, Nikolaos
2008
17 p. 4192-4198
7 p.
artikel
23 A modification of TCP flow control for improving end-to-end TCP performance over networks with wireless links Seok, Seung-Joon
2003
17 p. 1998-2010
13 p.
artikel
24 A multi-class probabilistic priority scheduling discipline for differentiated services networks Tham, Chen-Khong
2002
17 p. 1487-1496
10 p.
artikel
25 Analytic comparison results for communication networks van Dijk, Nico M.
1998
17 p. 1495-1508
14 p.
artikel
26 An application-specific duty cycle adjustment MAC protocol for energy conserving over wireless sensor networks Hsu, Tz-Heng
2008
17 p. 4081-4088
8 p.
artikel
27 An authentication scheme for filtering injected bogus data in sensor networks Kim, Yong Ho
2008
17 p. 3929-3932
4 p.
artikel
28 An efficient approach for trilateration in 3D positioning Doukhnitch, E.
2008
17 p. 4124-4129
6 p.
artikel
29 An efficient bandwidth management scheme for real-time Internet applications Wang, Fugui
2002
17 p. 1596-1605
10 p.
artikel
30 An efficient multipath structure for concurrent data transport in wireless mesh networks Hu, Xuhui
2007
17 p. 3358-3367
10 p.
artikel
31 An empirical study of the characteristics of Internet traffic Kushida, T.
1999
17 p. 1607-1618
12 p.
artikel
32 An energy-balancing clustering approach for gradient-based routing in wireless sensor networks Liu, Tao
2012
17 p. 2150-2161
12 p.
artikel
33 An energy diffserv and application-aware MAC scheduling for VBR streaming video in the IEEE 802.15.3 high-rate wireless personal area networks Chen, Xi
2006
17 p. 3516-3526
11 p.
artikel
34 A network-centric approach to enhancing the interactivity of large-scale distributed virtual environments Ta, Duong Nguyen Binh
2006
17 p. 3553-3566
14 p.
artikel
35 An evaluation of fair packet schedulers using a novel measure of instantaneous fairness Shi, Hongyuan
2005
17 p. 1925-1937
13 p.
artikel
36 A new framework for multiple access and call admission control in wireless cellular networks Koutsakis, Polychronis
2008
17 p. 3978-3983
6 p.
artikel
37 A new framework for QoS provisioning in WLANS using p-persistent 802.11 MAC Anna, Kiran
2008
17 p. 4035-4048
14 p.
artikel
38 An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks Chang, Ting-Yi
2009
17 p. 1829-1836
8 p.
artikel
39 An intensive survey of fair non-repudiation protocols Kremer, Steve
2002
17 p. 1606-1621
16 p.
artikel
40 An iterative distributed algorithm for multi-constraint multicast routing Huang, Tzu-Lun
2006
17 p. 3647-3661
15 p.
artikel
41 A note on dependable real-time communication in multihop networks Raghavan, S
2002
17 p. 1673-1683
11 p.
artikel
42 A novel channel assignment scheme for improving channel reuse efficiency in multi-channel ad hoc wireless networks Wu, Shih-Lin
2007
17 p. 3416-3424
9 p.
artikel
43 A novel distributed scheduling scheme for OFDMA uplink using channel information and probabilistic transmission Yaacoub, Elias
2011
17 p. 2104-2113
10 p.
artikel
44 A novel routing algorithm for WDM-based micro-cellular wireless system Pan, J.-Y.
2001
17 p. 1714-1725
12 p.
artikel
45 A power-saving scheduling for infrastructure-mode 802.11 wireless LANs Lin, Hsiao-Po
2006
17 p. 3483-3492
10 p.
artikel
46 Applied sciences in communication technologies Marchetti, Nicola
2010
17 p. 2013-2014
2 p.
artikel
47 Applying authorization to intranets: architectures, issues and APIs Ashley, P.
2000
17 p. 1613-1620
8 p.
artikel
48 A predictive dynamic output buffer reconfiguration (PDOBR) architecture for ATM networks Ghosh, Sumit
2006
17 p. 3609-3624
16 p.
artikel
49 A reliable asynchronous RPC architecture for wireless networks Lee, Man Kei
2002
17 p. 1631-1639
9 p.
artikel
50 A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks Hao, Dong
2012
17 p. 2125-2137
13 p.
artikel
51 A review on mobility management and vertical handover solutions over heterogeneous wireless networks Zekri, Mariem
2012
17 p. 2055-2068
14 p.
artikel
52 Artificial immune based hybrid GA for QoS based multicast routing in large scale networks (AISMR) Vijayalakshmi, K.
2008
17 p. 3984-3994
11 p.
artikel
53 Asymptotic delay analysis and timeout-based admission control for ad hoc wireless networks with asymmetric users El-Azouzi, Rachid
2010
17 p. 2057-2069
13 p.
artikel
54 A synopsis on node compromise detection in wireless sensor networks using sequential analysis (Invited Review Article) Das, Sajal K.
2011
17 p. 2003-2012
10 p.
artikel
55 A TCAM-based solution for integrated traffic anomaly detection and policy filtering Wang, Zhijun
2009
17 p. 1893-1901
9 p.
artikel
56 A timer-based mobile multicast routing protocol in mobile networks Park, Jin
2003
17 p. 1965-1974
10 p.
artikel
57 B-EDCA: A QoS mechanism for multimedia communications over heterogeneous 802.11/802.11e WLANs Villalón, José
2008
17 p. 3905-3921
17 p.
artikel
58 Block-Markov encoding with network coding for cooperative communications Menghwar, Gordhan Das
2010
17 p. 2021-2030
10 p.
artikel
59 Blue-Park: Energy-efficient operation of Bluetooth networks using park mode Popovski, Petar
2006
17 p. 3416-3424
9 p.
artikel
60 Book Review Puzmanova, Rita
2002
17 p. 1696-1697
2 p.
artikel
61 Bottlenecks in next generation DWDM-based optical networks Dhodhi, M.K.
2001
17 p. 1726-1733
8 p.
artikel
62 CAEM: A channel adaptive approach to energy management for wireless sensor networks Lin, Xiao-Hui
2006
17 p. 3343-3353
11 p.
artikel
63 Call for Papers 2001
17 p. I-
1 p.
artikel
64 Call for Papers 2001
17 p. III-
1 p.
artikel
65 Call for Papers 2001
17 p. II-
1 p.
artikel
66 Characterization and performance study of IP traffic in WDM networks Zhang, Liren
2001
17 p. 1702-1713
12 p.
artikel
67 Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS) Babu, B. Sathish
2008
17 p. 4060-4071
12 p.
artikel
68 Comparative study of broadcast and multicast in 3GPP and 3GPP2 networks Weng, Jeng-Feng
2008
17 p. 4220-4229
10 p.
artikel
69 Concurrent multipath communication for real-time traffic Fiore, M.
2007
17 p. 3307-3320
14 p.
artikel
70 Concurrent multipath transport Sarkar, Dilip
2007
17 p. 3215-3217
3 p.
artikel
71 Connection admission control in UMTS radio access networks Malomsoky, Szabolcs
2003
17 p. 2011-2023
13 p.
artikel
72 Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment Tian, Huirong
2006
17 p. 3567-3579
13 p.
artikel
73 Contents Continued 2007
17 p. I-
1 p.
artikel
74 Contents Continued 2006
17 p. IV-
1 p.
artikel
75 Context-aware end-to-end QoS qualitative diagnosis and quantitative guarantee based on Bayesian network Lin, Xiangtao
2010
17 p. 2132-2144
13 p.
artikel
76 Control mechanisms of presence updates: A tradeoff between traffic optimization and information consistency Beltran, Victoria
2012
17 p. 2093-2105
13 p.
artikel
77 Coordinated data prefetching for web contents Chen, Xin
2005
17 p. 1947-1958
12 p.
artikel
78 Coping with denial of service due to malicious Java applets Florio, M.F
2000
17 p. 1645-1654
10 p.
artikel
79 Cost-bandwidth tradeoff in distributed storage systems Akhlaghi, Soroush
2010
17 p. 2105-2115
11 p.
artikel
80 Countermeasures for mobile agent security Jansen, W.A
2000
17 p. 1667-1676
10 p.
artikel
81 Coverage-adaptive random sensor scheduling for application-aware data gathering in wireless sensor networks Choi, Wook
2006
17 p. 3467-3482
16 p.
artikel
82 Cross-layer analysis of error control in underwater wireless sensor networks Domingo, Mari Carmen
2012
17 p. 2162-2172
11 p.
artikel
83 Cross-layer application-specific wireless sensor network design with single-channel CSMA MAC over sense-sleep trees Ha, Rick W.
2006
17 p. 3425-3444
20 p.
artikel
84 Cross-layer modeling of capacity in wireless networks: Application to UMTS/HSDPA, IEEE802.11 WLAN and IEEE802.16 WiMAX Dirani, Mariana
2007
17 p. 3384-3391
8 p.
artikel
85 Current issues in high-speed networks Saleh, Kassem A.
2001
17 p. 1687-1688
2 p.
artikel
86 Data rate improvement with dynamic reassignment of spreading codes for DS-CDMA Assarut, Rujipun
2002
17 p. 1575-1583
9 p.
artikel
87 Deadline missing predictor based on aperiodic server queue length for distributed systems Plentz, P.D.M.
2008
17 p. 4167-4175
9 p.
artikel
88 Delay and data rate decoupled fair queueing for multimedia services in wireless networks Lee, Suwon
2003
17 p. 1944-1956
13 p.
artikel
89 Deployable multipath communication scheme with sufficient performance data distribution method Hasegawa, Yohei
2007
17 p. 3285-3292
8 p.
artikel
90 Design and evaluation of a context-aware service deployment for collaborative sessions Villemur, Thierry
2008
17 p. 4176-4191
16 p.
artikel
91 Design and performance analysis of multimedia document retrieval strategies for networked Video-on-Reservation systems Li, Xiaorong
2005
17 p. 1910-1924
15 p.
artikel
92 Designing, implementing and evaluating a new internetworking architecture Trossen, Dirk
2012
17 p. 2069-2081
13 p.
artikel
93 Dictionary of Multimedia and Internet Applications; F. Botto; Wiley, New York, 1998. ISBN 0-471-986-240; 350 pp., £34.95 Mukhopadhyay, D
1999
17 p. 1620-
1 p.
artikel
94 Directional geographical routing for real-time video communications in wireless sensor networks Chen, Min
2007
17 p. 3368-3383
16 p.
artikel
95 Distributed power control and random access for spectrum sharing with QoS constraint Yang, Bo
2008
17 p. 4089-4097
9 p.
artikel
96 Distributed relay selection over multi-source and multi-relay wireless cooperative networks with selfish nodes Li, Depeng
2010
17 p. 2145-2153
9 p.
artikel
97 Dynamic transition matrix generation for topology aggregation Iliadis, Ilias
2002
17 p. 1497-1512
16 p.
artikel
98 Dynamic transport layer handover for heterogeneous communication environments Lahde, Sven
2007
17 p. 3232-3238
7 p.
artikel
99 ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks Li, Zhifei
2005
17 p. 1970-1984
15 p.
artikel
100 Editorial 1998
17 p. 1491-1494
4 p.
artikel
101 Editorial Board 2003
17 p. IFC-
1 p.
artikel
102 Editorial Board 2006
17 p. CO2-
1 p.
artikel
103 Editorial Board 2008
17 p. IFC-
1 p.
artikel
104 Emulating output queueing with parallel packet switches Liu, Chia-Lung
2007
17 p. 3403-3415
13 p.
artikel
105 Energy efficiency and error resilience in coordinated and non-coordinated medium access control protocols Numanoglu, Tolga
2006
17 p. 3493-3506
14 p.
artikel
106 Energy efficiency of collision resolution protocols Bergman, Aran
2006
17 p. 3397-3415
19 p.
artikel
107 Energy efficient routing and scheduling for real-time data aggregation in WSNs Du, Hongwei
2006
17 p. 3527-3535
9 p.
artikel
108 Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance Cardei, Mihaela
2006
17 p. 3354-3365
12 p.
artikel
109 Energy-efficient scheduling and MAC for sensor networks, WPANs, WLANs, and WMANs Xiao, Yang
2006
17 p. 3341-3342
2 p.
artikel
110 Erratum to “Multiple-resource request scheduling for differentiated QoS at website gateway” Lin, Ying-Dar
2008
17 p. 4230-
1 p.
artikel
111 Evaluation of a start–stop protocol for best-effort traffic in ATM networks Iliadis, Ilias
1998
17 p. 1544-1558
15 p.
artikel
112 Experimental platform for telecommunication resource management Cselényi, I.
1998
17 p. 1624-1640
17 p.
artikel
113 Exploring TCP Parallelisation for performance improvement in heterogeneous networks Fu, Qiang
2007
17 p. 3321-3334
14 p.
artikel
114 Extending network lifetime for ALLIANCES Yang, Xinhua
2009
17 p. 1837-1851
15 p.
artikel
115 Fair bandwidth sharing and delay differentiation: Joint packet scheduling with buffer management Zhou, Xiaobo
2008
17 p. 4072-4080
9 p.
artikel
116 Fairness maximization and delay analysis for multi-antenna broadcast channels using random beamforming Akhlaghi, Soroush
2010
17 p. 2116-2124
9 p.
artikel
117 Fast knockout algorithm for self-route concentration Li, Shuo-Yen Robert
1999
17 p. 1574-1584
11 p.
artikel
118 Fast restoring gigabit wireless networks using a directional mesh architecture Wu, Yiwen
2003
17 p. 1957-1964
8 p.
artikel
119 Fault recovery mechanism in single-hop sensor networks Chessa, S.
2005
17 p. 1877-1886
10 p.
artikel
120 Fluid queues with long-tailed activity period distributions Boxma, O.J.
1998
17 p. 1509-1529
21 p.
artikel
121 From cognition to docition: The teaching radio paradigm for distributed & autonomous deployments Giupponi, Lorenza
2010
17 p. 2015-2020
6 p.
artikel
122 Functional reputation based reliable data aggregation and transmission for wireless sensor networks Ozdemir, Suat
2008
17 p. 3941-3953
13 p.
artikel
123 Fundamentals of Network Security Fan, Zhong
2002
17 p. 1698-
1 p.
artikel
124 Further analysis of the Internet key exchange protocol Zhou, J
2000
17 p. 1606-1612
7 p.
artikel
125 Fuzzy multiobjective routing model in B-ISDN Aboelela, Emad
1998
17 p. 1571-1584
14 p.
artikel
126 Genetic algorithm for delay- and degree-constrained multimedia broadcasting on overlay networks Tseng, Sheng-Yuan
2006
17 p. 3625-3632
8 p.
artikel
127 Genetic evolutionary algorithm for static traffic grooming to SONET over WDM optical networks Roy, Kuntal
2007
17 p. 3392-3402
11 p.
artikel
128 Guest editorial: 3G wireless and beyond Çam, Hasan
2003
17 p. 1905-1906
2 p.
artikel
129 Handover management based on the number of data frame retransmissions for VoWLAN Kashihara, Shigeru
2007
17 p. 3257-3269
13 p.
artikel
130 ICALB: an integrated congestion avoidance and load balancing algorithm for distributed intelligent networks. Part I: description of ICALB Stathopoulos, Vassilios M
2002
17 p. 1548-1563
16 p.
artikel
131 ICALB: an integrated congestion avoidance and load balancing algorithm for distributed intelligent networks. Part II: Performance evaluation of ICALB Stathopoulos, Vassilios M
2002
17 p. 1564-1574
11 p.
artikel
132 IFC - Editorial Board 2010
17 p. IFC-
1 p.
artikel
133 IFC - Editorial Board 2009
17 p. IFC-
1 p.
artikel
134 IFC Editorial Board 2007
17 p. IFC-
1 p.
artikel
135 IFC - Editorial Board 2012
17 p. IFC-
1 p.
artikel
136 IFC - Editorial Board 2011
17 p. IFC-
1 p.
artikel
137 IFC Editorial Board - top half 2005
17 p. CO2-
1 p.
artikel
138 IFC Editorial Board - top half 2004
17 p. IFC-
1 p.
artikel
139 Implementation and performance evaluation of an active RFID system for fast tag collection Yoon, Won-Ju
2008
17 p. 4107-4116
10 p.
artikel
140 Improved bounds for data-gathering time in sensor networks Revah, Yoram
2008
17 p. 4026-4034
9 p.
artikel
141 Improving performance of transport protocols in multipath transferring schemes Yabandeh, Maysam
2007
17 p. 3270-3284
15 p.
artikel
142 Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks Lee, Jong Chan
2012
17 p. 2106-2114
9 p.
artikel
143 Interactive Transparent Networking: Protocol meta modeling based on EFSM Khan, Javed I.
2006
17 p. 3536-3552
17 p.
artikel
144 Inter-carrier interference power of OFDM in a uniform scattering channel Le, Khoa N.
2008
17 p. 4130-4135
6 p.
artikel
145 Interface assignment and bandwidth allocation for multi-channel wireless mesh networks Wang, Jun
2008
17 p. 3995-4004
10 p.
artikel
146 Interference-Aware Bandwidth Reservation in multi-radio multi-channel mesh networks Ashraf, Usman
2012
17 p. 2138-2149
12 p.
artikel
147 Internet card, a smart card as a true Internet node Urien, P
2000
17 p. 1655-1666
12 p.
artikel
148 Introduction to Queuing Networks; E. Gelenbe, G. Pujolle; Wiley, New York, 1998. ISBN 0-471-962-945; 240 pp., £34.95 Atiquzzaman, M
1999
17 p. 1621-
1 p.
artikel
149 IP QoS support in IEEE 802.11b WLANs Grilo, António
2003
17 p. 1918-1930
13 p.
artikel
150 IPsec-based end-to-end VPN deployment over UMTS Xenakis, Christos
2004
17 p. 1693-1708
16 p.
artikel
151 Java Fast Sockets: Enabling high-speed Java communications on high performance clusters Taboada, Guillermo L.
2008
17 p. 4049-4059
11 p.
artikel
152 Jikzi — a new framework for security policy, trusted publishing and electronic commerce Anderson, R.
2000
17 p. 1621-1626
6 p.
artikel
153 Joint call admission control/congestion control for wireless integrated voice/data networks Chung, Shun-Ping
2002
17 p. 1653-1664
12 p.
artikel
154 Key agreement in ad hoc networks Asokan, N
2000
17 p. 1627-1637
11 p.
artikel
155 Measurement and mitigation of BitTorrent leecher attacks Dhungel, Prithula
2009
17 p. 1852-1861
10 p.
artikel
156 Methods of finding multiplicative inverses in GF(28) Saeed, Manzar
2008
17 p. 4117-4123
7 p.
artikel
157 Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme Xu, Mingwei
2012
17 p. 2082-2092
11 p.
artikel
158 Mini-slot scheduling for IEEE 802.16d chain and grid mesh networks Liang, Jia-Ming
2010
17 p. 2048-2056
9 p.
artikel
159 Mobile IPv6 deployments: Graph-based analysis and practical guidelines Valadon, Guillaume
2009
17 p. 1871-1880
10 p.
artikel
160 Mobility management in all-IP two-tier cellular networks Lin, Wen-Yen
2007
17 p. 3442-3446
5 p.
artikel
161 Mobility support in hybrid wireless/IP networking Mark, Jon W
2003
17 p. 1990-1997
8 p.
artikel
162 Modeling and analysis of queuing handoff calls in single and two-tier cellular networks Salih, Tara
2006
17 p. 3580-3590
11 p.
artikel
163 Modeling message propagation in random graph networks Wu, Bin
2008
17 p. 4138-4148
11 p.
artikel
164 Modeling requests among cooperating intrusion detection systems Ning, P
2000
17 p. 1702-1715
14 p.
artikel
165 Modelling and optimization of power consumption in wireless access networks Deruyck, Margot
2011
17 p. 2036-2046
11 p.
artikel
166 Multihoming route control among a group of multihomed stub networks Liu, Yong
2007
17 p. 3335-3345
11 p.
artikel
167 Mutual authentication and group key agreement for low-power mobile devices Bresson, Emmanuel
2004
17 p. 1730-1737
8 p.
artikel
168 Network forensics based on fuzzy logic and expert system Liao, Niandong
2009
17 p. 1881-1892
12 p.
artikel
169 Network traffic characterization and network information services—R&D on JGN Ashir, A
2001
17 p. 1734-1743
10 p.
artikel
170 New methods for shortest path selection for multimedia traffic with two delay constraints Roginsky, A.L
1999
17 p. 1531-1539
9 p.
artikel
171 Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems Çam, Hasan
2003
17 p. 1907-1917
11 p.
artikel
172 Non-greedy minimum interference routing algorithm for bandwidth-guaranteed flows Tan, Su-Wei
2002
17 p. 1640-1652
13 p.
artikel
173 Nonlinear optimization for energy efficiency in IEEE 802.11a wireless LANs Liu, Jian
2006
17 p. 3455-3466
12 p.
artikel
174 OBC - Contents 2005
17 p. CO4-
1 p.
artikel
175 OBC - Contents 2004
17 p. OBC-
1 p.
artikel
176 OBC - Contents 2007
17 p. OBC-
1 p.
artikel
177 OBC - Contents 2006
17 p. CO4-
1 p.
artikel
178 On a framework for energy-efficient security protocols in wireless networks Prasithsangaree, Phongsak
2004
17 p. 1716-1729
14 p.
artikel
179 On application-level load balancing in FastReplica Lee, Jangwon
2007
17 p. 3218-3231
14 p.
artikel
180 On object initialization in the Java bytecode Doyon, S
2000
17 p. 1594-1605
12 p.
artikel
181 On scalability properties of the Hi3 control plane Korzun, Dmitry
2006
17 p. 3591-3601
11 p.
artikel
182 On selecting the cost function for source routing Cheng, Gang
2006
17 p. 3602-3608
7 p.
artikel
183 On the construction of a powerful distributed authentication server without additional key management Hong, S.-M.
2000
17 p. 1638-1644
7 p.
artikel
184 On the performance evaluation of an LTE SFBC system with Wiener channel estimation in frequency-selective channels Horvat, Michael
2010
17 p. 2031-2038
8 p.
artikel
185 Optimal access control for integrated services wireless networks de Nitto Personè, Vittoria
1998
17 p. 1559-1570
12 p.
artikel
186 Optimal multicast multichannel routing in computer networks Isazadeh, Ayaz
2008
17 p. 4149-4161
13 p.
artikel
187 Overcoming the IEEE 802.11 paradox for realtime multimedia traffic Lorchat, Jean
2006
17 p. 3507-3515
9 p.
artikel
188 PBProbe: A capacity estimation tool for high speed networks Chen, Ling-Jyh
2008
17 p. 3883-3893
11 p.
artikel
189 PCN-based marked flow termination Menth, Michael
2011
17 p. 2082-2093
12 p.
artikel
190 Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Yu, Wei
2008
17 p. 4005-4017
13 p.
artikel
191 Performance analysis and comparison of interrupt-handling schemes in gigabit networks Salah, K.
2007
17 p. 3425-3441
17 p.
artikel
192 Performance analysis of alternate routing with trunk reservation in multirate switched networks Kim, Joonhwan
2002
17 p. 1665-1672
8 p.
artikel
193 Performance analysis of two schemes for managing information related to incall registration in wireline UPT networks Chung, M.Y.
1999
17 p. 1592-1606
15 p.
artikel
194 Performance evaluation of resource reservation and call admission policies for deterministic services in PGPS-based packet networks Elsayed, Khaled M.F.
2002
17 p. 1513-1526
14 p.
artikel
195 Performance evaluation of STBC based cooperative systems over slow Rayleigh fading channel Bai, Zhiquan
2008
17 p. 4206-4211
6 p.
artikel
196 Performance of TCP in IP/ATM internetworks Ren, Wenge
1998
17 p. 1610-1623
14 p.
artikel
197 Performance study of distributed channel allocation techniques for a fast circuit switched network Antal, Csaba
1998
17 p. 1597-1609
13 p.
artikel
198 Power-aware opportunistic downlink scheduling in IEEE 802.16 wireless networks Cicconetti, C.
2011
17 p. 2026-2035
10 p.
artikel
199 Practical connection admission control for ATM networks based on on-line measurements Lewis, John T.
1998
17 p. 1585-1596
12 p.
artikel
200 Pricing-based call admission control for wireless MPEG-4 traffic Lazaris, Aggelos
2009
17 p. 1781-1789
9 p.
artikel
201 Priority queuing of long-range dependent traffic Ashour, Mohamed
2008
17 p. 3954-3963
10 p.
artikel
202 Privacy and authentication protocol providing anonymous channels in GSM Peinado, Alberto
2004
17 p. 1709-1715
7 p.
artikel
203 Proactive seamless mobility management for future IP radio access networks Pagtzis, T
2003
17 p. 1975-1989
15 p.
artikel
204 Protocol design issues in underwater acoustic networks Casari, Paolo
2011
17 p. 2013-2025
13 p.
artikel
205 Randomization enhanced Chaum's blind signature scheme Fan, Chun-I
2000
17 p. 1677-1680
4 p.
artikel
206 Real-time packet scheduling in next generation radio access system Wan, Chiang-Shiang
2003
17 p. 1931-1943
13 p.
artikel
207 Rerouting in advance for preempted IR calls in QoS-enabled networks Ahmad, Iftekhar
2008
17 p. 3922-3928
7 p.
artikel
208 Research on anonymous signatures and group signatures Zhou, Fucai
2008
17 p. 4199-4205
7 p.
artikel
209 Review of quality of service performance in wireless LANs and 3G multimedia application services Baghaei, Nilufar
2004
17 p. 1684-1692
9 p.
artikel
210 Robust delay estimator for playout buffering in Internet audio applications Park, Kyung-Joon
2005
17 p. 1938-1946
9 p.
artikel
211 Robustness against Byzantine Failures in Distributed Spectrum Sensing Chen, Ruiliang
2012
17 p. 2115-2124
10 p.
artikel
212 SAGE based joint timing-frequency offsets and channel estimation in distributed MIMO systems Tian, Yuan
2010
17 p. 2125-2131
7 p.
artikel
213 Scalable secure one-to-many group communication using dual encryption Dondeti, L.R.
2000
17 p. 1681-1701
21 p.
artikel
214 Secure network coding for wireless mesh networks: Threats, challenges, and directions Dong, Jing
2009
17 p. 1790-1801
12 p.
artikel
215 Security performance of loaded IEEE 802.11b wireless networks Baghaei, Nilufar
2004
17 p. 1746-1756
11 p.
artikel
216 Security policy conceptual modeling and formalization for networked information systems Trček, D.
2000
17 p. 1716-1723
8 p.
artikel
217 Silent networking for energy-constrained nodes Zhang, Tao
2006
17 p. 3445-3454
10 p.
artikel
218 SNMP information based routing mechanism for fast handoff in mobile IP Ryu, Sang-Hoon
2005
17 p. 1887-1902
16 p.
artikel
219 SOM: spiral-fat-tree-based on-demand multicast protocol in a wireless ad-hoc network Chen, Yuh-Shyan
2002
17 p. 1684-1695
12 p.
artikel
220 Special issue on security and performance in wireless and mobile networks Hunt, Ray
2004
17 p. 1683-
1 p.
artikel
221 Special Section on Wireless networking Banchs, Albert
2011
17 p. iii-iv
nvt p.
artikel
222 Speed control and policing in a cellular mobile network: SpeedNet Pathirana, Pubudu N.
2006
17 p. 3633-3646
14 p.
artikel
223 Split-connection rearrangeably nonblocking operation of three-stage multirate Clos networks Liotopoulos, Fotios K.
2002
17 p. 1584-1595
12 p.
artikel
224 Stochastic comparisons: A methodology for the performance evaluation of fixed and mobile networks Mokdad, Lynda
2008
17 p. 3894-3904
11 p.
artikel
225 TCP throughput enhancement in wired-cum-wireless network Ghosh, Anup K.
2008
17 p. 4162-4166
5 p.
artikel
226 TDMA scheduling for event-triggered data aggregation in irregular wireless sensor networks Díaz-Anadón, Mario Orne
2011
17 p. 2072-2081
10 p.
artikel
227 Testing of Communicating Systems, Vol. 10 by Myungchul Kim, Sugwon Kang, Keesoo Hong (Eds.); London: Chapman & Hall, 1997, 452 pp., ISBN 0-412-81730-6 Hierons, R
1999
17 p. 1619-
1 p.
artikel
228 The application of security policy to role-based access control and the common data security architecture Lin, A
2000
17 p. 1584-1593
10 p.
artikel
229 The broadband bearer connection control protocol: performance driven design and implementation Giannakakis, P
1999
17 p. 1549-1561
13 p.
artikel
230 The enhanced staircase broadcasting for VBR videos Yu, Hsiang-Fu
2005
17 p. 1903-1909
7 p.
artikel
231 The handover control mechanism for multi-path transmission using Stream Control Transmission Protocol (SCTP) Huang, Chung-Ming
2007
17 p. 3239-3256
18 p.
artikel
232 The WICKPro protocol with the Packet Delivery Ratio metric Aísa, Jesús
2011
17 p. 2047-2056
10 p.
artikel
233 Throughput and lifetime performance of cost–credit-based routing protocols for power constrained ad hoc networks Tan, Wesley Chee-Wah
2008
17 p. 3964-3977
14 p.
artikel
234 Topology control for delay-constraint data collection in wireless sensor networks Xu, Hongli
2009
17 p. 1820-1828
9 p.
artikel
235 To VoIP or not to VoIP, is this really the question now? Robert, Likic
2008
17 p. 4136-4137
2 p.
artikel
236 Towards the accurate modelling of high-speed communication networks with product-form discrete-time networks of queues Woodward, Michael E.
1998
17 p. 1530-1543
14 p.
artikel
237 Traffic flooding attack detection with SNMP MIB using SVM Yu, Jaehak
2008
17 p. 4212-4219
8 p.
artikel
238 Traffic management in photonic packet switching nodes by priority assignment and selective discarding Ribeiro, Moisés R.N.
2001
17 p. 1689-1701
13 p.
artikel
239 Traffic shaping in real-time distributed systems: a low-complexity approach Gaujal, B.
1999
17 p. 1562-1573
12 p.
artikel
240 Unequal error protection for real-time video in mobile ad hoc networks via multi-path transport Abd El Al, Ahmed
2007
17 p. 3293-3306
14 p.
artikel
241 Usage parameter control schemes for improving MPEG video quality over ATM networks Kuo, F.-J.
1999
17 p. 1585-1591
7 p.
artikel
242 Utility max–min fair resource allocation for communication networks with multipath routing Jin, Jiong
2009
17 p. 1802-1809
8 p.
artikel
                             242 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland