nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cache invalidation strategy for mobile networks
|
Safa, Haidar |
|
2010 |
33 |
2 |
p. 168-182 15 p. |
artikel |
2 |
An efficient reconstruction approach for improving Bluetree scatternet formation in personal area networks
|
Lin, Jenn-Wei |
|
2010 |
33 |
2 |
p. 141-155 15 p. |
artikel |
3 |
A path-traceable query routing mechanism for search in unstructured peer-to-peer networks
|
Xu, Ming |
|
2010 |
33 |
2 |
p. 115-127 13 p. |
artikel |
4 |
A trusted decentralized access control framework for the client/server architecture
|
Han, Weili |
|
2010 |
33 |
2 |
p. 76-83 8 p. |
artikel |
5 |
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines
|
Su, Ming-Yang |
|
2010 |
33 |
2 |
p. 156-167 12 p. |
artikel |
6 |
Editorial board
|
|
|
2010 |
33 |
2 |
p. IFC- 1 p. |
artikel |
7 |
Flexible and secure service discovery in ubiquitous computing
|
Moschetta, Eduardo |
|
2010 |
33 |
2 |
p. 128-140 13 p. |
artikel |
8 |
Interest based selection of user generated content for rich communication services
|
Strobbe, Matthias |
|
2010 |
33 |
2 |
p. 84-97 14 p. |
artikel |
9 |
On the self-organization of a hybrid peer-to-peer system
|
Joung, Yuh-Jzer |
|
2010 |
33 |
2 |
p. 183-202 20 p. |
artikel |
10 |
Performance study of online batch-based digital signature schemes
|
Chou, Cheng-Fu |
|
2010 |
33 |
2 |
p. 98-114 17 p. |
artikel |
11 |
Special Issue of Journal of Network and Computer Applications on “Dependable Multimedia Communications: Systems, Services, and Applications”
|
|
|
2010 |
33 |
2 |
p. 203- 1 p. |
artikel |
12 |
Wireless sensor network key management survey and taxonomy
|
Zhang, Junqi |
|
2010 |
33 |
2 |
p. 63-75 13 p. |
artikel |