no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Adapting caching to audience retention rate
|
Maggi, Lorenzo |
|
2018 |
116 |
C |
p. 159-171 |
article |
2 |
A hop-by-hop dynamic distributed multipath routing mechanism for link state network
|
Geng, Haijun |
|
2018 |
116 |
C |
p. 225-239 |
article |
3 |
Analytical evaluation of heterogeneous cellular networks under flexible user association and frequency reuse
|
Fereydooni, Mehdi |
|
2018 |
116 |
C |
p. 147-158 |
article |
4 |
Anomaly detection mechanisms to find social events using cellular traffic data
|
Garroppo, Rosario G. |
|
2018 |
116 |
C |
p. 240-252 |
article |
5 |
A novel JXTA-based architecture for implementing heterogenous Networks of Things
|
Battaglia, Filippo |
|
2018 |
116 |
C |
p. 35-62 |
article |
6 |
Appendix
|
|
|
2018 |
116 |
C |
p. I-II |
article |
7 |
A user-oriented performance comparison of video hosting services
|
Botta, Alessio |
|
2018 |
116 |
C |
p. 118-131 |
article |
8 |
DECK: A distributed, asynchronous and exact k-connectivity detection algorithm for Wireless Sensor Networks
|
Akram, Vahid Khalilpour |
|
2018 |
116 |
C |
p. 9-20 |
article |
9 |
DFFR: A flow-based approach for distributed load balancing in Data Center Networks
|
Cheung, Chung-Ming |
|
2018 |
116 |
C |
p. 1-8 |
article |
10 |
Editorial Board
|
|
|
2018 |
116 |
C |
p. ii |
article |
11 |
Fairness-constrained optimized time-window controllers for secondary-users with primary-user reliability guarantees
|
Cordeschi, Nicola |
|
2018 |
116 |
C |
p. 63-76 |
article |
12 |
Fast and secure tag authentication in large-scale RFID systems using skip graphs
|
Komori, Yudai |
|
2018 |
116 |
C |
p. 77-89 |
article |
13 |
Fast packet classification algorithm for network-wide forwarding behaviors
|
Inoue, Takeru |
|
2018 |
116 |
C |
p. 101-117 |
article |
14 |
Incomplete information Markov game theoretic approach to strategy generation for moving target defense
|
Lei, Cheng |
|
2018 |
116 |
C |
p. 184-199 |
article |
15 |
Increasing user controllability on device specific privacy in the Internet of Things
|
Asif, Waqar |
|
2018 |
116 |
C |
p. 200-211 |
article |
16 |
Label space reduction based on LSP multiplexing in MPLS Openflow hybrid network
|
Huang, Liaoruo |
|
2018 |
116 |
C |
p. 21-34 |
article |
17 |
Realtime intrusion risk assessment model based on attack and service dependency graphs
|
Shameli-Sendi, Alireza |
|
2018 |
116 |
C |
p. 253-272 |
article |
18 |
The show must go on: Fundamental data plane connectivity services for dependable SDNs
|
Borokhovich, Michael |
|
2018 |
116 |
C |
p. 172-183 |
article |
19 |
Traffic engineering in cognitive mesh networks: Joint link-channel selection and power allocation
|
Islam, Maheen |
|
2018 |
116 |
C |
p. 212-224 |
article |
20 |
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks
|
Wang, Ji |
|
2018 |
116 |
C |
p. 90-100 |
article |
21 |
VRSense: Validity region sensitive query processing strategies for static and mobile point-of-interests in MANETs
|
Jung, Byungkwan |
|
2018 |
116 |
C |
p. 132-146 |
article |