nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative defense mechanism against SYN flooding attacks in IP networks
|
Safa, Haidar |
|
2008 |
31 |
4 |
p. 509-534 26 p. |
artikel |
2 |
Activity routing in a distributed supply chain: Performance evaluation with two inputs
|
Bhaskar, Vidhyacharan |
|
2008 |
31 |
4 |
p. 402-428 27 p. |
artikel |
3 |
A distributed expansible authentication model based on Kerberos
|
Liu, Hongjun |
|
2008 |
31 |
4 |
p. 472-486 15 p. |
artikel |
4 |
A framework to determine bounds of maximum loss rate parameter of RED queue for next generation routers
|
Zheng, Bing |
|
2008 |
31 |
4 |
p. 429-445 17 p. |
artikel |
5 |
Analysis of mobile agents in network fault management
|
Al-Kasassbeh, Mouhammd |
|
2008 |
31 |
4 |
p. 699-711 13 p. |
artikel |
6 |
An asynchronous MAC protocol for wireless sensor networks
|
Liao, Wen-Hwa |
|
2008 |
31 |
4 |
p. 807-820 14 p. |
artikel |
7 |
An efficient resource allocation scheme for multimedia applications in MANET
|
Varaprasad, G. |
|
2008 |
31 |
4 |
p. 577-584 8 p. |
artikel |
8 |
A new adaptive digital audio watermarking based on support vector machine
|
Wang, Xiang-Yang |
|
2008 |
31 |
4 |
p. 735-749 15 p. |
artikel |
9 |
A novel ANN-based service selection model for ubiquitous computing environments
|
Cai, Haibin |
|
2008 |
31 |
4 |
p. 944-965 22 p. |
artikel |
10 |
An upper bound model for TCP and UDP throughput in IPv4 and IPv6
|
Gamess, Eric |
|
2008 |
31 |
4 |
p. 585-602 18 p. |
artikel |
11 |
A scalable authentication model based on public keys
|
Liu, Hongjun |
|
2008 |
31 |
4 |
p. 375-386 12 p. |
artikel |
12 |
Assessing readiness of IP networks to support desktop videoconferencing using OPNET
|
Salah, K. |
|
2008 |
31 |
4 |
p. 921-943 23 p. |
artikel |
13 |
Cataclysm: Scalable overload policing for internet applications
|
Urgaonkar, Bhuvan |
|
2008 |
31 |
4 |
p. 891-920 30 p. |
artikel |
14 |
Computing in social networks with relationship algebra
|
Khan, Javed I. |
|
2008 |
31 |
4 |
p. 862-878 17 p. |
artikel |
15 |
Data aggregation in wireless sensor networks using ant colony algorithm
|
Liao, Wen-Hwa |
|
2008 |
31 |
4 |
p. 387-401 15 p. |
artikel |
16 |
Editorial board
|
|
|
2008 |
31 |
4 |
p. IFC- 1 p. |
artikel |
17 |
Hands-free vision-based interface for computer accessibility
|
Varona, Javier |
|
2008 |
31 |
4 |
p. 357-374 18 p. |
artikel |
18 |
Human activity recognition in pervasive health-care: Supporting efficient remote collaboration
|
Osmani, Venet |
|
2008 |
31 |
4 |
p. 628-655 28 p. |
artikel |
19 |
Interconnection of CAN segments through IEEE 802.16 wireless MAN
|
Ozcelik, Ibrahim |
|
2008 |
31 |
4 |
p. 879-890 12 p. |
artikel |
20 |
Multi-constraint QoS routing using a new single mixed metrics
|
Khadivi, P. |
|
2008 |
31 |
4 |
p. 656-676 21 p. |
artikel |
21 |
NectaRSS, an intelligent RSS feed reader
|
Samper, Juan J. |
|
2008 |
31 |
4 |
p. 793-806 14 p. |
artikel |
22 |
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility
|
Sahoo, Prasan Kumar |
|
2008 |
31 |
4 |
p. 535-558 24 p. |
artikel |
23 |
On the properties of spam-advertised URL addresses
|
Georgiou, Eleni |
|
2008 |
31 |
4 |
p. 966-985 20 p. |
artikel |
24 |
PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks
|
Zhang, Jianjun |
|
2008 |
31 |
4 |
p. 821-850 30 p. |
artikel |
25 |
Performance evaluation for DRED discrete-time queueing network analytical model
|
Abdel-Jaber, Hussein |
|
2008 |
31 |
4 |
p. 750-770 21 p. |
artikel |
26 |
Process-context aware matchmaking for web service composition
|
Han, Weili |
|
2008 |
31 |
4 |
p. 559-576 18 p. |
artikel |
27 |
Secure DACS Scheme
|
Odagiri, Kazuya |
|
2008 |
31 |
4 |
p. 851-861 11 p. |
artikel |
28 |
Securing dynamic itineraries for mobile agent applications
|
Garrigues, Carles |
|
2008 |
31 |
4 |
p. 487-508 22 p. |
artikel |
29 |
SIP-based proactive and adaptive mobility management framework for heterogeneous networks
|
Yee, Y.C. |
|
2008 |
31 |
4 |
p. 771-792 22 p. |
artikel |
30 |
The troubleshooting task implementation in automotive chassis using virtual interactive technique and knowledge-based approach
|
Liang, Janus S. |
|
2008 |
31 |
4 |
p. 712-734 23 p. |
artikel |
31 |
Trust-based evolutionary game model assisting AODV routing against selfishness
|
Komathy, K. |
|
2008 |
31 |
4 |
p. 446-471 26 p. |
artikel |
32 |
User Profile Modeling in the context of web-based learning management systems
|
Kritikou, Yiouli |
|
2008 |
31 |
4 |
p. 603-627 25 p. |
artikel |
33 |
Visualizing the evolution of a web-based social network
|
Prieto, Beatriz |
|
2008 |
31 |
4 |
p. 677-698 22 p. |
artikel |