nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive e-mails intention finding system based on words social networks
|
Mao, Ching-Hao |
|
2011 |
34 |
5 |
p. 1615-1622 8 p. |
artikel |
2 |
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
|
Wang, Chia-Hui |
|
2011 |
34 |
5 |
p. 1545-1556 12 p. |
artikel |
3 |
An adaptive-predictive architecture for video streaming servers
|
Fernandes, Stenio |
|
2011 |
34 |
5 |
p. 1683-1694 12 p. |
artikel |
4 |
A novel 3D streaming protocol supported multi-mode display
|
Liao, I.-Ju |
|
2011 |
34 |
5 |
p. 1509-1517 9 p. |
artikel |
5 |
A passive image authentication scheme for detecting region-duplication forgery with rotation
|
Liu, Guangjie |
|
2011 |
34 |
5 |
p. 1557-1565 9 p. |
artikel |
6 |
A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle
|
Ji, Wen |
|
2011 |
34 |
5 |
p. 1489-1497 9 p. |
artikel |
7 |
Application of the Java Message Service in mobile monitoring environments
|
Kuehnhausen, Martin |
|
2011 |
34 |
5 |
p. 1707-1716 10 p. |
artikel |
8 |
A survey of schemes for Internet-based video delivery
|
Ma, Kevin J. |
|
2011 |
34 |
5 |
p. 1572-1586 15 p. |
artikel |
9 |
CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition
|
Niu, Wenjia |
|
2011 |
34 |
5 |
p. 1757-1770 14 p. |
artikel |
10 |
Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks
|
Ma, Hwa-Chun |
|
2011 |
34 |
5 |
p. 1743-1756 14 p. |
artikel |
11 |
Dependable multimedia communications: Systems, services, and applications
|
Chao, Han-Chieh |
|
2011 |
34 |
5 |
p. 1447-1448 2 p. |
artikel |
12 |
Editorial board
|
|
|
2011 |
34 |
5 |
p. IFC- 1 p. |
artikel |
13 |
Energy efficient wireless unicast routing alternatives for machine-to-machine networks
|
Tekbiyik, Neyre |
|
2011 |
34 |
5 |
p. 1587-1614 28 p. |
artikel |
14 |
Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks
|
Chen, Yeong-Sheng |
|
2011 |
34 |
5 |
p. 1566-1571 6 p. |
artikel |
15 |
Enhanced statistics-based rate adaptation for 802.11 wireless networks
|
Zhang, Liqiang |
|
2011 |
34 |
5 |
p. 1695-1706 12 p. |
artikel |
16 |
Fast quarantining of proactive worms in unstructured P2P networks
|
Chen, Ting |
|
2011 |
34 |
5 |
p. 1648-1659 12 p. |
artikel |
17 |
Intelligent rate control for supporting real-time traffic in WLAN mesh networks
|
Zhu, Rongbo |
|
2011 |
34 |
5 |
p. 1449-1458 10 p. |
artikel |
18 |
Linear wireless sensor networks: Classification and applications
|
Jawhar, Imad |
|
2011 |
34 |
5 |
p. 1671-1682 12 p. |
artikel |
19 |
Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service
|
Leroux, Philip |
|
2011 |
34 |
5 |
p. 1474-1488 15 p. |
artikel |
20 |
Modeling architecture for collaborative virtual objects based on services
|
Pascual Espada, Jordán |
|
2011 |
34 |
5 |
p. 1634-1647 14 p. |
artikel |
21 |
Monitoring abnormal network traffic based on blind source separation approach
|
Qin, Tao |
|
2011 |
34 |
5 |
p. 1732-1742 11 p. |
artikel |
22 |
Multimedia applications over metropolitan area networks (MANs)
|
Mehmood, Rashid |
|
2011 |
34 |
5 |
p. 1518-1529 12 p. |
artikel |
23 |
New identity-based key-insulated convertible multi-authenticated encryption scheme
|
Hsu, Chien-Lung |
|
2011 |
34 |
5 |
p. 1724-1731 8 p. |
artikel |
24 |
Orthogonal feedback scheme for network coding
|
Yang, Jun |
|
2011 |
34 |
5 |
p. 1623-1633 11 p. |
artikel |
25 |
Policy controlled self-configuration in unattended wireless sensor networks
|
Misra, Sudip |
|
2011 |
34 |
5 |
p. 1530-1544 15 p. |
artikel |
26 |
PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks
|
Deng, Der-Jiunn |
|
2011 |
34 |
5 |
p. 1468-1473 6 p. |
artikel |
27 |
Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification
|
Shih, Po-Yi |
|
2011 |
34 |
5 |
p. 1459-1467 9 p. |
artikel |
28 |
Social network analysis of web links to eliminate false positives in collaborative anti-spam systems
|
Sadan, Zac |
|
2011 |
34 |
5 |
p. 1717-1723 7 p. |
artikel |
29 |
TTL based routing in opportunistic networks
|
Prodhan, Anindya Tahsin |
|
2011 |
34 |
5 |
p. 1660-1670 11 p. |
artikel |
30 |
Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks
|
Dhurandher, Sanjay K. |
|
2011 |
34 |
5 |
p. 1498-1508 11 p. |
artikel |