nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An ACK-based polling strategy for supporting high performance and QoS in IEEE 802.11 wireless networks
|
Sheu, Shiann-Tsong |
|
2006 |
29 |
3 |
p. 358-371 14 p. |
artikel |
2 |
A study of H.263 traffic modeling in multipoint videoconference sessions over IP networks
|
Drigas, A. |
|
2006 |
29 |
3 |
p. 372-391 20 p. |
artikel |
3 |
Economical protection in MPLS networks
|
Virk, Ajay Pal Singh |
|
2006 |
29 |
3 |
p. 402-408 7 p. |
artikel |
4 |
Evaluation of certificate validation mechanisms
|
Perlines Hormann, T. |
|
2006 |
29 |
3 |
p. 291-305 15 p. |
artikel |
5 |
Finding a least hop(s) path subject to multiple additive constraints
|
Cheng, Gang |
|
2006 |
29 |
3 |
p. 392-401 10 p. |
artikel |
6 |
IFC Editorial Board
|
|
|
2006 |
29 |
3 |
p. CO2- 1 p. |
artikel |
7 |
Internet security
|
Levine, Brian |
|
2006 |
29 |
3 |
p. 279- 1 p. |
artikel |
8 |
OBC - Contents
|
|
|
2006 |
29 |
3 |
p. CO4- 1 p. |
artikel |
9 |
Secure distributed intelligent networks
|
Kotzanikolaou, Panayiotis |
|
2006 |
29 |
3 |
p. 325-336 12 p. |
artikel |
10 |
Securing bulk content almost for free
|
Byers, John |
|
2006 |
29 |
3 |
p. 280-290 11 p. |
artikel |
11 |
Target access router selection in advanced mobility scenarios
|
Di Sorte, D. |
|
2006 |
29 |
3 |
p. 337-357 21 p. |
artikel |
12 |
Technical challenges of network anonymity
|
Kesdogan, D. |
|
2006 |
29 |
3 |
p. 306-324 19 p. |
artikel |