nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new method for reliability allocation of avionics connected via an airborne network
|
Li, Ruiying |
|
2015 |
48 |
C |
p. 14-21 8 p. |
artikel |
2 |
A novel framework to mitigate the negative impacts of green techniques on BGP
|
Ruiz-Rivera, Alejandro |
|
2015 |
48 |
C |
p. 22-34 13 p. |
artikel |
3 |
Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions
|
Liu, Jieyao |
|
2015 |
48 |
C |
p. 99-117 19 p. |
artikel |
4 |
A recursive Byzantine-resilient protocol
|
Cheng, Chien-Fu |
|
2015 |
48 |
C |
p. 87-98 12 p. |
artikel |
5 |
Coverage hole and boundary nodes detection in wireless sensor networks
|
Li, Wei |
|
2015 |
48 |
C |
p. 35-43 9 p. |
artikel |
6 |
Editorial board
|
|
|
2015 |
48 |
C |
p. IFC- 1 p. |
artikel |
7 |
Energy-efficient algorithms for distributed storage system based on block storage structure reconfiguration
|
Liao, Bin |
|
2015 |
48 |
C |
p. 71-86 16 p. |
artikel |
8 |
Improving area coverage of wireless sensor networks via controllable mobile nodes: A greedy approach
|
Vecchio, Massimo |
|
2015 |
48 |
C |
p. 1-13 13 p. |
artikel |
9 |
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
|
Akhunzada, Adnan |
|
2015 |
48 |
C |
p. 44-57 14 p. |
artikel |
10 |
Reader level filtering for efficient query processing in RFID middleware
|
Kabir, Muhammad Ashad |
|
2015 |
48 |
C |
p. 58-70 13 p. |
artikel |