nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive survey on scheduler for VoIP over WLAN
|
Nisar, Kashif |
|
2013 |
36 |
2 |
p. 933-948 16 p. |
artikel |
2 |
AGRIB-BHF: A sustainable and fault tolerant aggregation
|
Kumar, Mahesh |
|
2013 |
36 |
2 |
p. 881-886 6 p. |
artikel |
3 |
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues
|
Ever, Enver |
|
2013 |
36 |
2 |
p. 908-926 19 p. |
artikel |
4 |
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
|
Cervera, Gimer |
|
2013 |
36 |
2 |
p. 744-755 12 p. |
artikel |
5 |
An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks
|
Peng, Yuhuai |
|
2013 |
36 |
2 |
p. 843-857 15 p. |
artikel |
6 |
A novel model for user clicks identification based on hidden semi-Markov
|
Xu, C. |
|
2013 |
36 |
2 |
p. 791-798 8 p. |
artikel |
7 |
A novel solution to the energy hole problem in sensor networks
|
Watfa, Mohamed K. |
|
2013 |
36 |
2 |
p. 949-958 10 p. |
artikel |
8 |
A power laws-based reconstruction approach to end-to-end network traffic
|
Nie, Laisen |
|
2013 |
36 |
2 |
p. 898-907 10 p. |
artikel |
9 |
A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network
|
Al-shugran, Mahmoud |
|
2013 |
36 |
2 |
p. 887-897 11 p. |
artikel |
10 |
A survey and tutorial of wireless relay network protocols based on network coding
|
Hassan Mohammed, Ahmed |
|
2013 |
36 |
2 |
p. 593-610 18 p. |
artikel |
11 |
A survey of network flow applications
|
Li, Bingdong |
|
2013 |
36 |
2 |
p. 567-581 15 p. |
artikel |
12 |
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
|
Tyagi, Sudhanshu |
|
2013 |
36 |
2 |
p. 623-645 23 p. |
artikel |
13 |
A virtual square grid-based coverage algorithm of redundant node for wireless sensor network
|
Liu, Yanheng |
|
2013 |
36 |
2 |
p. 811-817 7 p. |
artikel |
14 |
Classification of malware based on integrated static and dynamic features
|
Islam, Rafiqul |
|
2013 |
36 |
2 |
p. 646-656 11 p. |
artikel |
15 |
Combination of data replication and scheduling algorithm for improving data availability in Data Grids
|
Mansouri, Najme |
|
2013 |
36 |
2 |
p. 711-722 12 p. |
artikel |
16 |
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks
|
Chan, Gaik-Yee |
|
2013 |
36 |
2 |
p. 829-842 14 p. |
artikel |
17 |
Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach
|
Wang, Chiapin |
|
2013 |
36 |
2 |
p. 667-676 10 p. |
artikel |
18 |
Dynamic key management in wireless sensor networks: A survey
|
He, Xiaobing |
|
2013 |
36 |
2 |
p. 611-622 12 p. |
artikel |
19 |
Editorial board
|
|
|
2013 |
36 |
2 |
p. IFC- 1 p. |
artikel |
20 |
Evaluating opportunistic networks in disaster scenarios
|
Martín-Campillo, Abraham |
|
2013 |
36 |
2 |
p. 870-880 11 p. |
artikel |
21 |
Fast and deterministic hash table lookup using discriminative bloom filters
|
Huang, Kun |
|
2013 |
36 |
2 |
p. 657-666 10 p. |
artikel |
22 |
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks
|
Lian, Kuang-Yow |
|
2013 |
36 |
2 |
p. 756-767 12 p. |
artikel |
23 |
Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing traffic
|
Vasiliadis, D.C. |
|
2013 |
36 |
2 |
p. 723-737 15 p. |
artikel |
24 |
New identity-based three-party authenticated key agreement protocol with provable security
|
Xiong, Hu |
|
2013 |
36 |
2 |
p. 927-932 6 p. |
artikel |
25 |
On the use of a full information feedback to stabilize RED
|
Jamali, Shahram |
|
2013 |
36 |
2 |
p. 858-869 12 p. |
artikel |
26 |
Position-based routing in vehicular networks: A survey
|
Bilal, Sardar Muhammad |
|
2013 |
36 |
2 |
p. 685-697 13 p. |
artikel |
27 |
Quantitative survivability evaluation of three virtual machine-based server architectures
|
Yang, Yan |
|
2013 |
36 |
2 |
p. 781-790 10 p. |
artikel |
28 |
Re-examining the performance bottleneck in a NIDS with detailed profiling
|
Lin, Po-Ching |
|
2013 |
36 |
2 |
p. 768-780 13 p. |
artikel |
29 |
Research on social relations cognitive model of mobile nodes in Internet of Things
|
An, Jian |
|
2013 |
36 |
2 |
p. 799-810 12 p. |
artikel |
30 |
Securing DSR against wormhole attacks in multirate ad hoc networks
|
Qazi, Shams |
|
2013 |
36 |
2 |
p. 582-592 11 p. |
artikel |
31 |
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies
|
Kretschmer, M. |
|
2013 |
36 |
2 |
p. 698-710 13 p. |
artikel |
32 |
TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of Things
|
Luo, Shiliang |
|
2013 |
36 |
2 |
p. 738-743 6 p. |
artikel |
33 |
Virtual machine power measuring technique with bounded error in cloud environments
|
Xiao, Peng |
|
2013 |
36 |
2 |
p. 818-828 11 p. |
artikel |
34 |
Windows Mobile LiveSD Forensics
|
Canlar, Eyüp S. |
|
2013 |
36 |
2 |
p. 677-684 8 p. |
artikel |