Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A branching process approach to compute the delay and energy efficiency of tree algorithms with free access Block, R.
2014
58 C p. 13-28
16 p.
artikel
2 A measurement-based study on the correlations of inter-domain Internet application flows Wu, Xiaofei
2014
58 C p. 127-140
14 p.
artikel
3 An adaptive collision resolution scheme for energy efficient communication in IEEE 802.15.4 networks Jung, Kyoung-Hak
2014
58 C p. 39-57
19 p.
artikel
4 An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth Kim, Jin Cheol
2014
58 C p. 158-179
22 p.
artikel
5 EDITORIAL Akyildiz, Ian F.
2014
58 C p. 1-
1 p.
artikel
6 Editorial Board 2014
58 C p. IFC-
1 p.
artikel
7 Energy efficient cooperative communications using coalition formation games Lai, Hung-Quoc
2014
58 C p. 228-238
11 p.
artikel
8 Flow-based partitioning of network testbed experiments Yao, Wei-Min
2014
58 C p. 141-157
17 p.
artikel
9 60GHz wireless links in data center networks Vardhan, Hars
2014
58 C p. 192-205
14 p.
artikel
10 Joint optimal AF relay assignment and power allocation in wireless cooperative networks Uddin, Mohammad Faisal
2014
58 C p. 58-69
12 p.
artikel
11 Localizing link failures in all-optical networks using monitoring tours Cho, Sangman
2014
58 C p. 2-12
11 p.
artikel
12 Modeling test cases for security protocols with SecureMDD Katkalov, Kuzman
2014
58 C p. 99-111
13 p.
artikel
13 Multi-user wireless channel probing for shared key generation with a fuzzy controller Dou, Lihua
2014
58 C p. 112-126
15 p.
artikel
14 Network aware dynamic context subscription management Shawky, A.
2014
58 C p. 239-253
15 p.
artikel
15 Optimized hash for network path encoding with minimized false positives Carrea, Laura
2014
58 C p. 180-191
12 p.
artikel
16 Provably secure three-party authenticated key agreement protocol using smart cards Yang, Haomin
2014
58 C p. 29-38
10 p.
artikel
17 Sequential sensing based spectrum handoff in cognitive radio networks with multiple users Zhang, Wenjie
2014
58 C p. 87-98
12 p.
artikel
18 The design and implementation of the A3 application-aware anonymity platform Sherr, Micah
2014
58 C p. 206-227
22 p.
artikel
19 Topology management techniques for tolerating node failures in wireless sensor networks: A survey Younis, Mohamed
2014
58 C p. 254-283
30 p.
artikel
20 Trustworthy placements: Improving quality and resilience in collaborative attack detection Gil PĂ©rez, Manuel
2014
58 C p. 70-86
17 p.
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland