nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A branching process approach to compute the delay and energy efficiency of tree algorithms with free access
|
Block, R. |
|
2014 |
58 |
C |
p. 13-28 16 p. |
artikel |
2 |
A measurement-based study on the correlations of inter-domain Internet application flows
|
Wu, Xiaofei |
|
2014 |
58 |
C |
p. 127-140 14 p. |
artikel |
3 |
An adaptive collision resolution scheme for energy efficient communication in IEEE 802.15.4 networks
|
Jung, Kyoung-Hak |
|
2014 |
58 |
C |
p. 39-57 19 p. |
artikel |
4 |
An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth
|
Kim, Jin Cheol |
|
2014 |
58 |
C |
p. 158-179 22 p. |
artikel |
5 |
EDITORIAL
|
Akyildiz, Ian F. |
|
2014 |
58 |
C |
p. 1- 1 p. |
artikel |
6 |
Editorial Board
|
|
|
2014 |
58 |
C |
p. IFC- 1 p. |
artikel |
7 |
Energy efficient cooperative communications using coalition formation games
|
Lai, Hung-Quoc |
|
2014 |
58 |
C |
p. 228-238 11 p. |
artikel |
8 |
Flow-based partitioning of network testbed experiments
|
Yao, Wei-Min |
|
2014 |
58 |
C |
p. 141-157 17 p. |
artikel |
9 |
60GHz wireless links in data center networks
|
Vardhan, Hars |
|
2014 |
58 |
C |
p. 192-205 14 p. |
artikel |
10 |
Joint optimal AF relay assignment and power allocation in wireless cooperative networks
|
Uddin, Mohammad Faisal |
|
2014 |
58 |
C |
p. 58-69 12 p. |
artikel |
11 |
Localizing link failures in all-optical networks using monitoring tours
|
Cho, Sangman |
|
2014 |
58 |
C |
p. 2-12 11 p. |
artikel |
12 |
Modeling test cases for security protocols with SecureMDD
|
Katkalov, Kuzman |
|
2014 |
58 |
C |
p. 99-111 13 p. |
artikel |
13 |
Multi-user wireless channel probing for shared key generation with a fuzzy controller
|
Dou, Lihua |
|
2014 |
58 |
C |
p. 112-126 15 p. |
artikel |
14 |
Network aware dynamic context subscription management
|
Shawky, A. |
|
2014 |
58 |
C |
p. 239-253 15 p. |
artikel |
15 |
Optimized hash for network path encoding with minimized false positives
|
Carrea, Laura |
|
2014 |
58 |
C |
p. 180-191 12 p. |
artikel |
16 |
Provably secure three-party authenticated key agreement protocol using smart cards
|
Yang, Haomin |
|
2014 |
58 |
C |
p. 29-38 10 p. |
artikel |
17 |
Sequential sensing based spectrum handoff in cognitive radio networks with multiple users
|
Zhang, Wenjie |
|
2014 |
58 |
C |
p. 87-98 12 p. |
artikel |
18 |
The design and implementation of the A3 application-aware anonymity platform
|
Sherr, Micah |
|
2014 |
58 |
C |
p. 206-227 22 p. |
artikel |
19 |
Topology management techniques for tolerating node failures in wireless sensor networks: A survey
|
Younis, Mohamed |
|
2014 |
58 |
C |
p. 254-283 30 p. |
artikel |
20 |
Trustworthy placements: Improving quality and resilience in collaborative attack detection
|
Gil PĂ©rez, Manuel |
|
2014 |
58 |
C |
p. 70-86 17 p. |
artikel |