Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             21 results found
no title author magazine year volume issue page(s) type
1 Adaptive data aggregation scheme in clustered wireless sensor networks Chen, Huifang
2008
31 15 p. 3579-3585
7 p.
article
2 A mailbox ownership based mechanism for curbing spam Jamali, Nadeem
2008
31 15 p. 3586-3593
8 p.
article
3 Analysis and placement of storage capacity in large distributed video servers Cholvi, Vicent
2008
31 15 p. 3604-3612
9 p.
article
4 An enhancement of TCP Veno with forward acknowledgement Zhang, Ke
2008
31 15 p. 3683-3690
8 p.
article
5 A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6) Kandikattu, Ramanarayana
2008
31 15 p. 3707-3718
12 p.
article
6 Balancing intrusion detection resources in ubiquitous computing networks Zhou, Bo
2008
31 15 p. 3643-3653
11 p.
article
7 Contents Continued 2008
31 15 p. III-
1 p.
article
8 CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast Yi, Yunjung
2008
31 15 p. 3672-3682
11 p.
article
9 Cross-layer multiuser resource allocation for video communication over OFDM networks Ha, Hojin
2008
31 15 p. 3553-3563
11 p.
article
10 Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks Chen, Ching-Wen
2008
31 15 p. 3725-3738
14 p.
article
11 Dynamic Power Management with Scheduled Switching Modes Sausen, Paulo Sérgio
2008
31 15 p. 3625-3637
13 p.
article
12 Editorial Board 2008
31 15 p. IFC-
1 p.
article
13 Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control Zhang, Xu
2008
31 15 p. 3638-3642
5 p.
article
14 Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks Harhira, Hichem Ayed
2008
31 15 p. 3700-3706
7 p.
article
15 Modeling and performance analysis of realizable optical queue with service differentiation capability Shao, Xuguang
2008
31 15 p. 3654-3661
8 p.
article
16 Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints Kao, Yu-Fen
2008
31 15 p. 3613-3624
12 p.
article
17 Protocols for purpose-restricted anonymous communications in IP-based wireless networks Fathi, Hanane
2008
31 15 p. 3662-3671
10 p.
article
18 QoS multicast aggregation under multiple additive constraints Ben Ali, N.
2008
31 15 p. 3564-3578
15 p.
article
19 Risk assessment in practice: A real case study Benini, Marco
2008
31 15 p. 3691-3699
9 p.
article
20 Security weakness in an authenticated group key agreement protocol in two rounds Hwang, Jung Yeon
2008
31 15 p. 3719-3724
6 p.
article
21 Simplified fast handover in mobile IPv6 networks Van Hanh, Nguyen
2008
31 15 p. 3594-3603
10 p.
article
                             21 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands