nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks
|
Lai, Yuan-Cheng |
|
2012 |
35 |
6 |
p. 2092-2104 13 p. |
artikel |
2 |
A combined approach to ensure data security in cloud computing
|
Sood, Sandeep K. |
|
2012 |
35 |
6 |
p. 1831-1838 8 p. |
artikel |
3 |
A distributed resource discovery algorithm for P2P grids
|
Akbari Torkestani, Javad |
|
2012 |
35 |
6 |
p. 2028-2036 9 p. |
artikel |
4 |
A flexible building management framework based on wireless sensor and actuator networks
|
Fortino, G. |
|
2012 |
35 |
6 |
p. 1934-1952 19 p. |
artikel |
5 |
A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems
|
Hu, Chih-Lin |
|
2012 |
35 |
6 |
p. 1990-2002 13 p. |
artikel |
6 |
A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
|
Tan, Zuowen |
|
2012 |
35 |
6 |
p. 1839-1846 8 p. |
artikel |
7 |
An aggregate marker for bandwidth fairness in DiffServ
|
Sudha, S. |
|
2012 |
35 |
6 |
p. 1973-1978 6 p. |
artikel |
8 |
An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing
|
de Castro, Miguel Franklin |
|
2012 |
35 |
6 |
p. 2003-2015 13 p. |
artikel |
9 |
An ontology-based semantic service for cooperative urban equipments
|
Gregor, D. |
|
2012 |
35 |
6 |
p. 2037-2050 14 p. |
artikel |
10 |
An optimized approach for storing and accessing small files on cloud storage
|
Dong, Bo |
|
2012 |
35 |
6 |
p. 1847-1862 16 p. |
artikel |
11 |
An overview of the internet of underwater things
|
Domingo, Mari Carmen |
|
2012 |
35 |
6 |
p. 1879-1890 12 p. |
artikel |
12 |
Ant colony algorithms in MANETs: A review
|
Singh, Gurpreet |
|
2012 |
35 |
6 |
p. 1964-1972 9 p. |
artikel |
13 |
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network
|
Xie, Yi |
|
2012 |
35 |
6 |
p. 2081-2091 11 p. |
artikel |
14 |
A systematic method for network topology reconfiguration with limited link additions
|
Li, Li |
|
2012 |
35 |
6 |
p. 1979-1989 11 p. |
artikel |
15 |
Bandwidth aggregation in heterogeneous wireless networks: A survey of current approaches and issues
|
Ramaboli, Allen L. |
|
2012 |
35 |
6 |
p. 1674-1690 17 p. |
artikel |
16 |
Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc
|
Moulahi, Tarek |
|
2012 |
35 |
6 |
p. 1720-1727 8 p. |
artikel |
17 |
Cognitive radio network security: A survey
|
Parvin, Sazia |
|
2012 |
35 |
6 |
p. 1691-1708 18 p. |
artikel |
18 |
Content-aware rate allocation for efficient video streaming via dynamic network utility maximization
|
Hajiesmaili, Mohammad H. |
|
2012 |
35 |
6 |
p. 2016-2027 12 p. |
artikel |
19 |
Deep packet inspection tools and techniques in commodity platforms: Challenges and trends
|
Antonello, Rafael |
|
2012 |
35 |
6 |
p. 1863-1878 16 p. |
artikel |
20 |
Editorial board
|
|
|
2012 |
35 |
6 |
p. IFC- 1 p. |
artikel |
21 |
Efficient autonomous signature exchange on ubiquitous networks
|
Shi, Q. |
|
2012 |
35 |
6 |
p. 1793-1806 14 p. |
artikel |
22 |
Energy-aware performance analysis methodologies for HPC architectures—An exploratory study
|
Benedict, Shajulin |
|
2012 |
35 |
6 |
p. 1709-1719 11 p. |
artikel |
23 |
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity
|
Amad, Mourad |
|
2012 |
35 |
6 |
p. 1818-1830 13 p. |
artikel |
24 |
Inference of network anomaly propagation using spatio-temporal correlation
|
Amaral, Alexandre Aguiar |
|
2012 |
35 |
6 |
p. 1781-1792 12 p. |
artikel |
25 |
Kernel-based particle filtering for indoor tracking in WLANs
|
Zhang, Victoria Ying |
|
2012 |
35 |
6 |
p. 1807-1817 11 p. |
artikel |
26 |
Link stability estimation based on link connectivity changes in mobile ad-hoc networks
|
Song, Qingyang |
|
2012 |
35 |
6 |
p. 2051-2058 8 p. |
artikel |
27 |
Multiagent driven dynamic clustering of vehicles in VANETs
|
Kakkasageri, M.S. |
|
2012 |
35 |
6 |
p. 1771-1780 10 p. |
artikel |
28 |
Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks
|
Shokrzadeh, Hamid |
|
2012 |
35 |
6 |
p. 1749-1761 13 p. |
artikel |
29 |
Performance comparison of end-to-end mobility management protocols for TCP
|
Shah, Peer Azmat |
|
2012 |
35 |
6 |
p. 1657-1673 17 p. |
artikel |
30 |
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks
|
Darabkh, Khalid A. |
|
2012 |
35 |
6 |
p. 2068-2080 13 p. |
artikel |
31 |
Power-saving mechanisms for energy efficient IEEE 802.16e/m
|
Choi, JungYul |
|
2012 |
35 |
6 |
p. 1728-1739 12 p. |
artikel |
32 |
PUF-enhanced offline RFID security and privacy
|
Kardaş, Süleyman |
|
2012 |
35 |
6 |
p. 2059-2067 9 p. |
artikel |
33 |
Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases
|
Bakillah, Mohamed |
|
2012 |
35 |
6 |
p. 1918-1933 16 p. |
artikel |
34 |
Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks
|
Zungeru, Adamu Murtala |
|
2012 |
35 |
6 |
p. 1901-1917 17 p. |
artikel |
35 |
Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes
|
Liu, Linfeng |
|
2012 |
35 |
6 |
p. 1953-1963 11 p. |
artikel |
36 |
Traffic management strategy for delay-tolerant networks
|
Shin, Kwangcheol |
|
2012 |
35 |
6 |
p. 1762-1770 9 p. |
artikel |
37 |
Using incremental subspace and contour template for object tracking
|
Yin, Jihao |
|
2012 |
35 |
6 |
p. 1740-1748 9 p. |
artikel |
38 |
VEACON: A Vehicular Accident Ontology designed to improve safety on the roads
|
Barrachina, Javier |
|
2012 |
35 |
6 |
p. 1891-1900 10 p. |
artikel |