Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             30 results found
no title author magazine year volume issue page(s) type
1 Adaptive e-mails intention finding system based on words social networks Mao, Ching-Hao
2011
34 5 p. 1615-1622
8 p.
article
2 A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes Wang, Chia-Hui
2011
34 5 p. 1545-1556
12 p.
article
3 An adaptive-predictive architecture for video streaming servers Fernandes, Stenio
2011
34 5 p. 1683-1694
12 p.
article
4 A novel 3D streaming protocol supported multi-mode display Liao, I.-Ju
2011
34 5 p. 1509-1517
9 p.
article
5 A passive image authentication scheme for detecting region-duplication forgery with rotation Liu, Guangjie
2011
34 5 p. 1557-1565
9 p.
article
6 A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle Ji, Wen
2011
34 5 p. 1489-1497
9 p.
article
7 Application of the Java Message Service in mobile monitoring environments Kuehnhausen, Martin
2011
34 5 p. 1707-1716
10 p.
article
8 A survey of schemes for Internet-based video delivery Ma, Kevin J.
2011
34 5 p. 1572-1586
15 p.
article
9 CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition Niu, Wenjia
2011
34 5 p. 1757-1770
14 p.
article
10 Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks Ma, Hwa-Chun
2011
34 5 p. 1743-1756
14 p.
article
11 Dependable multimedia communications: Systems, services, and applications Chao, Han-Chieh
2011
34 5 p. 1447-1448
2 p.
article
12 Editorial board 2011
34 5 p. IFC-
1 p.
article
13 Energy efficient wireless unicast routing alternatives for machine-to-machine networks Tekbiyik, Neyre
2011
34 5 p. 1587-1614
28 p.
article
14 Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks Chen, Yeong-Sheng
2011
34 5 p. 1566-1571
6 p.
article
15 Enhanced statistics-based rate adaptation for 802.11 wireless networks Zhang, Liqiang
2011
34 5 p. 1695-1706
12 p.
article
16 Fast quarantining of proactive worms in unstructured P2P networks Chen, Ting
2011
34 5 p. 1648-1659
12 p.
article
17 Intelligent rate control for supporting real-time traffic in WLAN mesh networks Zhu, Rongbo
2011
34 5 p. 1449-1458
10 p.
article
18 Linear wireless sensor networks: Classification and applications Jawhar, Imad
2011
34 5 p. 1671-1682
12 p.
article
19 Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service Leroux, Philip
2011
34 5 p. 1474-1488
15 p.
article
20 Modeling architecture for collaborative virtual objects based on services Pascual Espada, Jordán
2011
34 5 p. 1634-1647
14 p.
article
21 Monitoring abnormal network traffic based on blind source separation approach Qin, Tao
2011
34 5 p. 1732-1742
11 p.
article
22 Multimedia applications over metropolitan area networks (MANs) Mehmood, Rashid
2011
34 5 p. 1518-1529
12 p.
article
23 New identity-based key-insulated convertible multi-authenticated encryption scheme Hsu, Chien-Lung
2011
34 5 p. 1724-1731
8 p.
article
24 Orthogonal feedback scheme for network coding Yang, Jun
2011
34 5 p. 1623-1633
11 p.
article
25 Policy controlled self-configuration in unattended wireless sensor networks Misra, Sudip
2011
34 5 p. 1530-1544
15 p.
article
26 PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks Deng, Der-Jiunn
2011
34 5 p. 1468-1473
6 p.
article
27 Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification Shih, Po-Yi
2011
34 5 p. 1459-1467
9 p.
article
28 Social network analysis of web links to eliminate false positives in collaborative anti-spam systems Sadan, Zac
2011
34 5 p. 1717-1723
7 p.
article
29 TTL based routing in opportunistic networks Prodhan, Anindya Tahsin
2011
34 5 p. 1660-1670
11 p.
article
30 Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks Dhurandher, Sanjay K.
2011
34 5 p. 1498-1508
11 p.
article
                             30 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands