nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bidding model and cooperative game-based vertical handoff decision algorithm
|
Liu, Xingwei |
|
2011 |
34 |
4 |
p. 1263-1271 9 p. |
artikel |
2 |
Advanced topics in cloud computing
|
Li, Keqiu |
|
2011 |
34 |
4 |
p. 1033-1034 2 p. |
artikel |
3 |
A framework for collaborative remote experimentation for a physical laboratory using a low cost embedded web server
|
Ocaya, R.O. |
|
2011 |
34 |
4 |
p. 1408-1415 8 p. |
artikel |
4 |
A link stability-based multicast routing protocol for wireless mobile ad hoc networks
|
Akbari Torkestani, Javad |
|
2011 |
34 |
4 |
p. 1429-1440 12 p. |
artikel |
5 |
A model-based framework to automate the analysis of users' activity in collaborative systems
|
Duque, Rafael |
|
2011 |
34 |
4 |
p. 1200-1209 10 p. |
artikel |
6 |
An efficient anonymous authentication protocol for mobile pay-TV
|
Chen, Tien-Ho |
|
2011 |
34 |
4 |
p. 1131-1137 7 p. |
artikel |
7 |
Anomaly detection in wireless sensor networks: A survey
|
Xie, Miao |
|
2011 |
34 |
4 |
p. 1302-1325 24 p. |
artikel |
8 |
Applying a usage control model in an operating system kernel
|
Teigão, Rafael |
|
2011 |
34 |
4 |
p. 1342-1352 11 p. |
artikel |
9 |
A survey on quality of service support in wireless sensor and actor networks: Requirements and challenges in the context of critical infrastructure protection
|
Chen, Jaime |
|
2011 |
34 |
4 |
p. 1225-1239 15 p. |
artikel |
10 |
Building a trusted route in a mobile ad hoc network considering communication reliability and path length
|
Wang, Jian |
|
2011 |
34 |
4 |
p. 1138-1149 12 p. |
artikel |
11 |
Client/server messaging protocols in serverless environments
|
Dean, Justin |
|
2011 |
34 |
4 |
p. 1366-1379 14 p. |
artikel |
12 |
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
|
Chonka, Ashley |
|
2011 |
34 |
4 |
p. 1097-1107 11 p. |
artikel |
13 |
Dynamic Congestion Control through backup relay in Bluetooth scatternet
|
Tahir Bakhsh, Sheikh |
|
2011 |
34 |
4 |
p. 1252-1262 11 p. |
artikel |
14 |
Editorial board
|
|
|
2011 |
34 |
4 |
p. IFC- 1 p. |
artikel |
15 |
Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction
|
Kong, Xiangzhen |
|
2011 |
34 |
4 |
p. 1068-1077 10 p. |
artikel |
16 |
Email FI identification and resolution with model checking
|
Calvinho, André Vicente |
|
2011 |
34 |
4 |
p. 1441-1446 6 p. |
artikel |
17 |
Group mobility support in mobile WiMAX networks
|
Lu, Qi |
|
2011 |
34 |
4 |
p. 1272-1282 11 p. |
artikel |
18 |
Hybrid congestion control for high-speed networks
|
Xu, Wenjun |
|
2011 |
34 |
4 |
p. 1416-1428 13 p. |
artikel |
19 |
INtERCEDE: An algorithmic approach to networked control system design
|
Senol, Sinan |
|
2011 |
34 |
4 |
p. 1326-1341 16 p. |
artikel |
20 |
Joint opportunistic power and rate allocation for wireless ad hoc networks: An adaptive particle swarm optimization approach
|
Guo, Songtao |
|
2011 |
34 |
4 |
p. 1353-1365 13 p. |
artikel |
21 |
Layered video multicast with a P2P cooperation approach
|
Shen, Yanming |
|
2011 |
34 |
4 |
p. 1108-1112 5 p. |
artikel |
22 |
Location-based authentication protocol for first cognitive radio networking standard
|
Kim, Hyun Sung |
|
2011 |
34 |
4 |
p. 1160-1167 8 p. |
artikel |
23 |
Message scheduling with reduced matrix cycle and evenly distributed sparse allocation for time-triggered CAN
|
Tenruh, Mahmut |
|
2011 |
34 |
4 |
p. 1240-1251 12 p. |
artikel |
24 |
Minimalist approach to show emotions via a flock of smileys
|
Ibáñez, Jesús |
|
2011 |
34 |
4 |
p. 1283-1291 9 p. |
artikel |
25 |
Mutual information-based feature selection for intrusion detection systems
|
Amiri, Fatemeh |
|
2011 |
34 |
4 |
p. 1184-1199 16 p. |
artikel |
26 |
Optimization of sub-query processing in distributed data integration systems
|
Chen, Gang |
|
2011 |
34 |
4 |
p. 1035-1042 8 p. |
artikel |
27 |
Optimizing the live migration of virtual machine by CPU scheduling
|
Jin, Hai |
|
2011 |
34 |
4 |
p. 1088-1096 9 p. |
artikel |
28 |
Ripple: A publish/subscribe service for multidata item updates propagation in the cloud
|
Zhu, Yuqing |
|
2011 |
34 |
4 |
p. 1054-1067 14 p. |
artikel |
29 |
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy
|
Hu, J. |
|
2011 |
34 |
4 |
p. 1150-1159 10 p. |
artikel |
30 |
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
|
Challal, Y. |
|
2011 |
34 |
4 |
p. 1380-1397 18 p. |
artikel |
31 |
Secure virtualization for cloud computing
|
Lombardi, Flavio |
|
2011 |
34 |
4 |
p. 1113-1122 10 p. |
artikel |
32 |
SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud
|
Shi, Weidong |
|
2011 |
34 |
4 |
p. 1078-1087 10 p. |
artikel |
33 |
Super-peer-based coordinated service provision
|
Liu, Meirong |
|
2011 |
34 |
4 |
p. 1210-1224 15 p. |
artikel |
34 |
Swarm behavior control of mobile multi-robots with wireless sensor networks
|
Li, Wenfeng |
|
2011 |
34 |
4 |
p. 1398-1407 10 p. |
artikel |
35 |
Systematic design of secure Mobile Grid systems
|
Rosado, David G. |
|
2011 |
34 |
4 |
p. 1168-1183 16 p. |
artikel |
36 |
Task assignment policies in distributed server systems: A survey
|
Semchedine, Fouzi |
|
2011 |
34 |
4 |
p. 1123-1130 8 p. |
artikel |
37 |
Using one-time passwords to prevent password phishing attacks
|
Huang, Chun-Ying |
|
2011 |
34 |
4 |
p. 1292-1301 10 p. |
artikel |
38 |
Verifying mediated service interactions considering expected behaviours
|
Zhou, Z. |
|
2011 |
34 |
4 |
p. 1043-1053 11 p. |
artikel |