Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             34 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive survey on scheduler for VoIP over WLAN Nisar, Kashif
2013
36 2 p. 933-948
16 p.
artikel
2 AGRIB-BHF: A sustainable and fault tolerant aggregation Kumar, Mahesh
2013
36 2 p. 881-886
6 p.
artikel
3 A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues Ever, Enver
2013
36 2 p. 908-926
19 p.
artikel
4 A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs Cervera, Gimer
2013
36 2 p. 744-755
12 p.
artikel
5 An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks Peng, Yuhuai
2013
36 2 p. 843-857
15 p.
artikel
6 A novel model for user clicks identification based on hidden semi-Markov Xu, C.
2013
36 2 p. 791-798
8 p.
artikel
7 A novel solution to the energy hole problem in sensor networks Watfa, Mohamed K.
2013
36 2 p. 949-958
10 p.
artikel
8 A power laws-based reconstruction approach to end-to-end network traffic Nie, Laisen
2013
36 2 p. 898-907
10 p.
artikel
9 A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network Al-shugran, Mahmoud
2013
36 2 p. 887-897
11 p.
artikel
10 A survey and tutorial of wireless relay network protocols based on network coding Hassan Mohammed, Ahmed
2013
36 2 p. 593-610
18 p.
artikel
11 A survey of network flow applications Li, Bingdong
2013
36 2 p. 567-581
15 p.
artikel
12 A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks Tyagi, Sudhanshu
2013
36 2 p. 623-645
23 p.
artikel
13 A virtual square grid-based coverage algorithm of redundant node for wireless sensor network Liu, Yanheng
2013
36 2 p. 811-817
7 p.
artikel
14 Classification of malware based on integrated static and dynamic features Islam, Rafiqul
2013
36 2 p. 646-656
11 p.
artikel
15 Combination of data replication and scheduling algorithm for improving data availability in Data Grids Mansouri, Najme
2013
36 2 p. 711-722
12 p.
artikel
16 Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks Chan, Gaik-Yee
2013
36 2 p. 829-842
14 p.
artikel
17 Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach Wang, Chiapin
2013
36 2 p. 667-676
10 p.
artikel
18 Dynamic key management in wireless sensor networks: A survey He, Xiaobing
2013
36 2 p. 611-622
12 p.
artikel
19 Editorial board 2013
36 2 p. IFC-
1 p.
artikel
20 Evaluating opportunistic networks in disaster scenarios Martín-Campillo, Abraham
2013
36 2 p. 870-880
11 p.
artikel
21 Fast and deterministic hash table lookup using discriminative bloom filters Huang, Kun
2013
36 2 p. 657-666
10 p.
artikel
22 Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks Lian, Kuang-Yow
2013
36 2 p. 756-767
12 p.
artikel
23 Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing traffic Vasiliadis, D.C.
2013
36 2 p. 723-737
15 p.
artikel
24 New identity-based three-party authenticated key agreement protocol with provable security Xiong, Hu
2013
36 2 p. 927-932
6 p.
artikel
25 On the use of a full information feedback to stabilize RED Jamali, Shahram
2013
36 2 p. 858-869
12 p.
artikel
26 Position-based routing in vehicular networks: A survey Bilal, Sardar Muhammad
2013
36 2 p. 685-697
13 p.
artikel
27 Quantitative survivability evaluation of three virtual machine-based server architectures Yang, Yan
2013
36 2 p. 781-790
10 p.
artikel
28 Re-examining the performance bottleneck in a NIDS with detailed profiling Lin, Po-Ching
2013
36 2 p. 768-780
13 p.
artikel
29 Research on social relations cognitive model of mobile nodes in Internet of Things An, Jian
2013
36 2 p. 799-810
12 p.
artikel
30 Securing DSR against wormhole attacks in multirate ad hoc networks Qazi, Shams
2013
36 2 p. 582-592
11 p.
artikel
31 Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies Kretschmer, M.
2013
36 2 p. 698-710
13 p.
artikel
32 TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of Things Luo, Shiliang
2013
36 2 p. 738-743
6 p.
artikel
33 Virtual machine power measuring technique with bounded error in cloud environments Xiao, Peng
2013
36 2 p. 818-828
11 p.
artikel
34 Windows Mobile LiveSD Forensics Canlar, Eyüp S.
2013
36 2 p. 677-684
8 p.
artikel
                             34 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland