nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A∗-based key tree structure generation for group key management in wireless sensor networks
|
Kim, Jin Myoung |
|
2008 |
31 |
10 |
p. 2414-2419 6 p. |
artikel |
2 |
A behavior and delay equivalent petri net model for performance evaluation of communication protocols
|
Youness, Osama S. |
|
2008 |
31 |
10 |
p. 2210-2230 21 p. |
artikel |
3 |
Achieving proportional loss rate differentiation in a wireless network with a multi-state link
|
Lai, Yuan-Cheng |
|
2008 |
31 |
10 |
p. 2341-2349 9 p. |
artikel |
4 |
Adaptive fuzzy-based rate management and power control in multimedia CDMA cellular systems
|
Chen, Young-Long |
|
2008 |
31 |
10 |
p. 1901-1910 10 p. |
artikel |
5 |
Adaptive handoff scheme for heterogeneous IP wireless networks
|
Makaya, Christian |
|
2008 |
31 |
10 |
p. 2094-2108 15 p. |
artikel |
6 |
Adaptive hierarchical polling and Markov decision process based CAC for increasing network reward and reducing average delay in IEEE 802.16 WiMAX networks
|
Chang, Ben-Jye |
|
2008 |
31 |
10 |
p. 2280-2292 13 p. |
artikel |
7 |
Adaptive QoS provisioning by pricing incentive QoS routing for next generation networks
|
Cheng, Gang |
|
2008 |
31 |
10 |
p. 2308-2318 11 p. |
artikel |
8 |
A game-theoretic analysis of wireless access point selection by mobile users
|
Mittal, Kimaya |
|
2008 |
31 |
10 |
p. 2049-2062 14 p. |
artikel |
9 |
A genetic algorithm for energy-efficient based multicast routing on MANETs
|
Yen, Yun-Sheng |
|
2008 |
31 |
10 |
p. 2632-2641 10 p. |
artikel |
10 |
A genetic algorithm for solving virtual topology reconfiguration problem in survivable WDM networks with reconfiguration constraint
|
Din, Der-Rong |
|
2008 |
31 |
10 |
p. 2520-2533 14 p. |
artikel |
11 |
A hybrid priority-based video-on-demand resource sharing scheme
|
Huang, Chenn-Jung |
|
2008 |
31 |
10 |
p. 2231-2241 11 p. |
artikel |
12 |
A lightweight brokering system for content/service charging in a cellular network centric business model
|
Leu, Jenq-Shiou |
|
2008 |
31 |
10 |
p. 2078-2085 8 p. |
artikel |
13 |
All-to-all broadcast in optical WDM networks under light-tree model
|
Sabrigiriraj, M. |
|
2008 |
31 |
10 |
p. 2562-2565 4 p. |
artikel |
14 |
A localization protocol with adaptive power control in wireless sensor networks
|
Liao, Wen-Hwa |
|
2008 |
31 |
10 |
p. 2496-2504 9 p. |
artikel |
15 |
An adaptive clustering routing transition protocol in ad hoc networks
|
Jia, Xu |
|
2008 |
31 |
10 |
p. 1952-1960 9 p. |
artikel |
16 |
Analysis and design of a k-Anycast communication model in IPv6
|
Wang, Xiaonan |
|
2008 |
31 |
10 |
p. 2071-2077 7 p. |
artikel |
17 |
Analysis of UMTS radio channel access delay
|
Srivastava, Shikha |
|
2008 |
31 |
10 |
p. 1877-1889 13 p. |
artikel |
18 |
An efficient mobile multicast mechanism for fast handovers: A study from design and implementation in experimental networks
|
Kwon, Dong-Hee |
|
2008 |
31 |
10 |
p. 2162-2177 16 p. |
artikel |
19 |
An efficient scheme for broadcasting popular videos at low buffer demand
|
Yu, Hsiang-Fu |
|
2008 |
31 |
10 |
p. 2270-2279 10 p. |
artikel |
20 |
An electronic voting protocol with deniable authentication for mobile ad hoc networks
|
Li, Chun-Ta |
|
2008 |
31 |
10 |
p. 2534-2540 7 p. |
artikel |
21 |
A new mutual authentication scheme based on nonce and smart cards
|
Liu, Jia-Yong |
|
2008 |
31 |
10 |
p. 2205-2209 5 p. |
artikel |
22 |
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
|
Wang, Fengjiao |
|
2008 |
31 |
10 |
p. 2142-2149 8 p. |
artikel |
23 |
An improved lightpath allocation for grade of services in survivable WDM mesh networks
|
Wei, Xuetao |
|
2008 |
31 |
10 |
p. 2391-2397 7 p. |
artikel |
24 |
An overview of vertical handover decision strategies in heterogeneous wireless networks
|
Kassar, Meriem |
|
2008 |
31 |
10 |
p. 2607-2620 14 p. |
artikel |
25 |
A robust proportional controller for AQM based on optimized second-order system model
|
Wang, Jianxin |
|
2008 |
31 |
10 |
p. 2468-2477 10 p. |
artikel |
26 |
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
|
Isaac, Jesus Tellez |
|
2008 |
31 |
10 |
p. 2478-2484 7 p. |
artikel |
27 |
Buffer-driven adaptive video streaming with TCP-friendliness
|
Lee, Sunhun |
|
2008 |
31 |
10 |
p. 2621-2630 10 p. |
artikel |
28 |
Collaborative data gathering in wireless sensor networks using measurement co-occurrence
|
Kalpakis, Konstantinos |
|
2008 |
31 |
10 |
p. 1979-1992 14 p. |
artikel |
29 |
Design and analysis of an adaptive object replication algorithm in distributed network systems
|
Wujuan, Lin |
|
2008 |
31 |
10 |
p. 2005-2015 11 p. |
artikel |
30 |
Design of a stabilizing AQM controller for large-delay networks based on internal model control
|
Wang, Jianxin |
|
2008 |
31 |
10 |
p. 1911-1918 8 p. |
artikel |
31 |
Dual-threshold admission control for non-real-time traffic in wireless data networks
|
Tzeng, Show-Shiow |
|
2008 |
31 |
10 |
p. 2428-2434 7 p. |
artikel |
32 |
Dynamic adjustment of Scalable TCP congestion control parameters
|
Tekala, Mohamed |
|
2008 |
31 |
10 |
p. 1890-1900 11 p. |
artikel |
33 |
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks
|
Jin, Yan |
|
2008 |
31 |
10 |
p. 2398-2407 10 p. |
artikel |
34 |
Editorial Board
|
|
|
2008 |
31 |
10 |
p. IFC- 1 p. |
artikel |
35 |
Effective hotspot storage management schemes in wireless sensor networks
|
Liao, Wen-Hwa |
|
2008 |
31 |
10 |
p. 2131-2141 11 p. |
artikel |
36 |
Energy-efficient geographic routing with virtual anchors based on projection distance
|
Zhao, Gang |
|
2008 |
31 |
10 |
p. 2195-2204 10 p. |
artikel |
37 |
Energy-efficient packet scheduling algorithms for real-time communications in a mobile WiMAX system
|
Tsao, Shiao-Li |
|
2008 |
31 |
10 |
p. 2350-2359 10 p. |
artikel |
38 |
Enhanced fast handoff scheme for heterogeneous wireless networks
|
Makaya, Christian |
|
2008 |
31 |
10 |
p. 2016-2029 14 p. |
artikel |
39 |
Erratum to “A genetic algorithm for energy-efficient based multicast routing on MANETs” [Comput. Commun. 31 (2008) 858–869]
|
Yen, Yun-Sheng |
|
2008 |
31 |
10 |
p. 2631- 1 p. |
artikel |
40 |
Fair exchange protocol of signatures based on aggregate signatures
|
Shao, Zuhua |
|
2008 |
31 |
10 |
p. 1961-1969 9 p. |
artikel |
41 |
Feasibility of QoS control based on QoS mapping over IP networks
|
Ito, Yoshihiro |
|
2008 |
31 |
10 |
p. 2589-2595 7 p. |
artikel |
42 |
Frame synchronization, channel estimation scheme and signal compensation using regression method in OFDM systems
|
Wen, Jyh-Horng |
|
2008 |
31 |
10 |
p. 2124-2130 7 p. |
artikel |
43 |
Fuzzy priority based overlay multicast
|
Yu, Jun |
|
2008 |
31 |
10 |
p. 1919-1933 15 p. |
artikel |
44 |
Game theoretic models for detecting network intrusions
|
Otrok, Hadi |
|
2008 |
31 |
10 |
p. 1934-1944 11 p. |
artikel |
45 |
General approach to simple algorithms for 2-D positioning techniques in cellular networks
|
Doukhnitch, E. |
|
2008 |
31 |
10 |
p. 2185-2194 10 p. |
artikel |
46 |
Global data allocation based on user behaviors in mobile computing environments
|
Huang, Yin-Fu |
|
2008 |
31 |
10 |
p. 2420-2427 8 p. |
artikel |
47 |
Harmony search based algorithms for bandwidth-delay-constrained least-cost multicast routing
|
Forsati, R. |
|
2008 |
31 |
10 |
p. 2505-2519 15 p. |
artikel |
48 |
Hi3: An efficient and secure networking architecture for mobile hosts
|
Gurtov, Andrei |
|
2008 |
31 |
10 |
p. 2457-2467 11 p. |
artikel |
49 |
High-performance packet scheduling to provide relative delay differentiation in future high-speed networks
|
Wu, Chin-Chi |
|
2008 |
31 |
10 |
p. 1865-1876 12 p. |
artikel |
50 |
Implementing and evaluating three routing protocols in dual-radio-dual-mode IEEE 802.11(b) wireless mesh networks
|
Wang, S.Y. |
|
2008 |
31 |
10 |
p. 2596-2606 11 p. |
artikel |
51 |
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol
|
Hölbl, Marko |
|
2008 |
31 |
10 |
p. 1945-1951 7 p. |
artikel |
52 |
Improve throughput of TCP-Vegas in multihop ad hoc networks
|
Ding, Lianghui |
|
2008 |
31 |
10 |
p. 2581-2588 8 p. |
artikel |
53 |
Latent Handover: A flow-oriented progressive handover mechanism
|
Wang, Jingyu |
|
2008 |
31 |
10 |
p. 2319-2340 22 p. |
artikel |
54 |
Link stress reduction in topology-aware overlay path monitoring
|
Fraiwan, M. |
|
2008 |
31 |
10 |
p. 2086-2093 8 p. |
artikel |
55 |
Location-based assisted handover for the IP Multimedia Subsystem
|
Fabini, Joachim |
|
2008 |
31 |
10 |
p. 2367-2380 14 p. |
artikel |
56 |
Markov chain analysis of uplink subframe in polling-based WiMAX networks
|
Chang, Ben-Jye |
|
2008 |
31 |
10 |
p. 2381-2390 10 p. |
artikel |
57 |
Multiple-resource request scheduling for differentiated QoS at website gateway
|
Lin, Ying-Dar |
|
2008 |
31 |
10 |
p. 1993-2004 12 p. |
artikel |
58 |
Near optimal fair delay based resource allocation for video traffic over wireless multimedia system
|
Rizk, M.R.M. |
|
2008 |
31 |
10 |
p. 2360-2366 7 p. |
artikel |
59 |
Network utility maximization for triple-play services
|
Shi, Lei |
|
2008 |
31 |
10 |
p. 2257-2269 13 p. |
artikel |
60 |
Optimization of logical rings for multi-hop transmissions in WDM optical star networks
|
Liu, JungChun |
|
2008 |
31 |
10 |
p. 2030-2038 9 p. |
artikel |
61 |
Patching-based broadcasting scheme for video services
|
Chand, Satish |
|
2008 |
31 |
10 |
p. 1970-1978 9 p. |
artikel |
62 |
Proactive rearrangement in delay constrained dynamic membership multicast
|
Yong, Keen-Mun |
|
2008 |
31 |
10 |
p. 2566-2580 15 p. |
artikel |
63 |
Reliability improvement for an RFID-based psychiatric patient localization system
|
Huang, Chieh-Ling |
|
2008 |
31 |
10 |
p. 2039-2048 10 p. |
artikel |
64 |
Resilience of structured P2P systems under churn: The reachable component method
|
Kong, Joseph S. |
|
2008 |
31 |
10 |
p. 2109-2123 15 p. |
artikel |
65 |
Routing and admission control with multiconstrained end-to-end quality of service in MPLS networks
|
Oulai, Desire |
|
2008 |
31 |
10 |
p. 1857-1864 8 p. |
artikel |
66 |
Seamless service interworking of ad-hoc networks and the Internet
|
Manner, Jukka |
|
2008 |
31 |
10 |
p. 2293-2307 15 p. |
artikel |
67 |
Secure and scalable many-to-one symbol transmission for sensor networks
|
Viejo, Alexandre |
|
2008 |
31 |
10 |
p. 2408-2413 6 p. |
artikel |
68 |
Simulation and analysis of an admission control mechanism for MPLS DS-TE
|
Mahmoud, Omer |
|
2008 |
31 |
10 |
p. 2178-2184 7 p. |
artikel |
69 |
Survivability in waveband switching optical networks: Challenges and new ideas
|
Wang, Xingwei |
|
2008 |
31 |
10 |
p. 2435-2442 8 p. |
artikel |
70 |
TCP-Cherry: A new approach for TCP congestion control over satellite IP networks
|
Utsumi, Satoshi |
|
2008 |
31 |
10 |
p. 2541-2561 21 p. |
artikel |
71 |
TCP fairness issues in IEEE 802.11 wireless LANs
|
Wu, Qian |
|
2008 |
31 |
10 |
p. 2150-2161 12 p. |
artikel |
72 |
TCP friendly protocols for media streams over heterogeneous wired–wireless networks
|
ElAarag, Hala |
|
2008 |
31 |
10 |
p. 2242-2256 15 p. |
artikel |
73 |
Trade-off guidelines for power management mechanism in the IEEE 802.16e MAC
|
Kim, Min-Gon |
|
2008 |
31 |
10 |
p. 2063-2070 8 p. |
artikel |
74 |
Traffic volume analysis of a nation-wide eMule community
|
Caviglione, Luca |
|
2008 |
31 |
10 |
p. 2485-2495 11 p. |
artikel |
75 |
Two layer Denial of Service prevention on SIP VoIP infrastructures
|
Ehlert, Sven |
|
2008 |
31 |
10 |
p. 2443-2456 14 p. |
artikel |