nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An effective vertical handoff scheme based on service management for ubiquitous computing
|
Hong, Chung-Pyo |
|
2008 |
31 |
9 |
p. 1739-1750 12 p. |
artikel |
2 |
A new heuristic routing algorithm with Hamiltonian Cycle Protection in survivable networks
|
Guo, Lei |
|
2008 |
31 |
9 |
p. 1672-1678 7 p. |
artikel |
3 |
A novel approach for assigning wavelengths in multihop WDM optical networks
|
Jana, Sahadeb |
|
2008 |
31 |
9 |
p. 1751-1762 12 p. |
artikel |
4 |
A novel early DBA mechanism with prediction-based fair excessive bandwidth allocation scheme in EPON
|
Hwang, I-Shyan |
|
2008 |
31 |
9 |
p. 1814-1823 10 p. |
artikel |
5 |
A trade-off between energy and delay in data dissemination for wireless sensor networks using transmission range slicing
|
Ammari, Habib M. |
|
2008 |
31 |
9 |
p. 1687-1704 18 p. |
artikel |
6 |
Autonomous decision on intrusion detection with trained BDI agents
|
Orfila, Agustín |
|
2008 |
31 |
9 |
p. 1803-1813 11 p. |
artikel |
7 |
Centralized and distributed joint dual transmitter receiver diversity and power control for wireless networks
|
Wang, Jui Teng |
|
2008 |
31 |
9 |
p. 1705-1712 8 p. |
artikel |
8 |
Design, implementation and evaluation of a QoS-aware transport protocol
|
Jourjon, Guillaume |
|
2008 |
31 |
9 |
p. 1713-1722 10 p. |
artikel |
9 |
Editorial Board
|
|
|
2008 |
31 |
9 |
p. IFC- 1 p. |
artikel |
10 |
Efficient placement of proxies for hierarchical reliable multicast
|
Tan, Liansheng |
|
2008 |
31 |
9 |
p. 1842-1855 14 p. |
artikel |
11 |
Encoding for secure computations in distributed interactive real-time applications
|
Endo, Keiichi |
|
2008 |
31 |
9 |
p. 1679-1686 8 p. |
artikel |
12 |
Fast reroute with pre-established bypass tunnel in MPLS
|
Lai, Wei Kuang |
|
2008 |
31 |
9 |
p. 1660-1671 12 p. |
artikel |
13 |
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
|
Raza, Imran |
|
2008 |
31 |
9 |
p. 1796-1802 7 p. |
artikel |
14 |
Improving connectivity in vehicular ad hoc networks: An analytical study
|
Yousefi, Saleh |
|
2008 |
31 |
9 |
p. 1653-1659 7 p. |
artikel |
15 |
Network congestion avoidance strategy with particle filter
|
Qian, Xiaolong |
|
2008 |
31 |
9 |
p. 1723-1726 4 p. |
artikel |
16 |
On the performance of O3BPSK LDD with diversity combining techniques over fading channels
|
Cheng, Chia-Hsin |
|
2008 |
31 |
9 |
p. 1832-1841 10 p. |
artikel |
17 |
Performance comparison of scheduling algorithms in network mobility environment
|
Wang, Yaning |
|
2008 |
31 |
9 |
p. 1727-1738 12 p. |
artikel |
18 |
Providing delay guaranteed service in CDMA wireless networks
|
Ma, Maode |
|
2008 |
31 |
9 |
p. 1785-1795 11 p. |
artikel |
19 |
The tradeoff between maximizing the sensor network lifetime and the fastest way to report reliably an event using reporting nodes’ selection
|
Bouabdallah, Fatma |
|
2008 |
31 |
9 |
p. 1763-1776 14 p. |
artikel |
20 |
Transforming general networks into feed-forward by using turn-prohibition
|
Echagüe, Juan |
|
2008 |
31 |
9 |
p. 1824-1831 8 p. |
artikel |
21 |
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
|
Dehkordi, Massoud Hadian |
|
2008 |
31 |
9 |
p. 1777-1784 8 p. |
artikel |