nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new explicit congestion notification scheme for satellite IP networks
|
Utsumi, Satoshi |
|
2016 |
75 |
C |
p. 169-180 12 p. |
artikel |
2 |
A novel hybrid medium access control protocol for inter-M2M communications
|
Verma, Pawan Kumar |
|
2016 |
75 |
C |
p. 77-88 12 p. |
artikel |
3 |
A survey on cloud computing security: Issues, threats, and solutions
|
Singh, Saurabh |
|
2016 |
75 |
C |
p. 200-222 23 p. |
artikel |
4 |
A survey on service function chaining
|
Bhamare, Deval |
|
2016 |
75 |
C |
p. 138-155 18 p. |
artikel |
5 |
A virtual replica node-based flash crowds alleviation method for sensor overlay networks
|
Shao, Xun |
|
2016 |
75 |
C |
p. 374-384 11 p. |
artikel |
6 |
Block Negative Acknowledgement protocol for reliable multicast in IEEE 802.11
|
Daldoul, Yousri |
|
2016 |
75 |
C |
p. 32-46 15 p. |
artikel |
7 |
Buyer seller watermarking protocols issues and challenges – A survey
|
Khan, Abid |
|
2016 |
75 |
C |
p. 317-334 18 p. |
artikel |
8 |
Copy-move forgery detection: Survey, challenges and future directions
|
Warif, Nor Bakiah Abd |
|
2016 |
75 |
C |
p. 259-278 20 p. |
artikel |
9 |
Cost-aware service brokering and performance sentient load balancing algorithms in the cloud
|
Naha, Ranesh Kumar |
|
2016 |
75 |
C |
p. 47-57 11 p. |
artikel |
10 |
Editorial board
|
|
|
2016 |
75 |
C |
p. IFC- 1 p. |
artikel |
11 |
Efficient event handling in Wireless Sensor and Actor Networks: An on-line computation approach
|
Konstantopoulos, Charalampos |
|
2016 |
75 |
C |
p. 181-199 19 p. |
artikel |
12 |
GOSPF: An energy efficient implementation of the OSPF routing protocol
|
D'Arienzo, M. |
|
2016 |
75 |
C |
p. 110-127 18 p. |
artikel |
13 |
High throughput graphics processing unit based Fano decoder
|
Ates, Ozgur |
|
2016 |
75 |
C |
p. 128-137 10 p. |
artikel |
14 |
Optimal drone placement and cost-efficient target coverage
|
Zorbas, Dimitrios |
|
2016 |
75 |
C |
p. 16-31 16 p. |
artikel |
15 |
Optimization based spectral partitioning for node criticality assessment
|
Asif, Waqar |
|
2016 |
75 |
C |
p. 279-292 14 p. |
artikel |
16 |
Piconet construction and restructuring mechanisms for interference avoiding in bluetooth PANs
|
Zhang, Qiaoyun |
|
2016 |
75 |
C |
p. 89-100 12 p. |
artikel |
17 |
PRADD: A path reliability-aware data delivery protocol for underwater acoustic sensor networks
|
Nowsheen, Nusrat |
|
2016 |
75 |
C |
p. 385-397 13 p. |
artikel |
18 |
Survey on low power real-time wireless MAC protocols
|
Bartolomeu, Paulo |
|
2016 |
75 |
C |
p. 293-316 24 p. |
artikel |
19 |
The coverage problem in visual sensor networks: A target oriented approach
|
Zannat, Hafsa |
|
2016 |
75 |
C |
p. 1-15 15 p. |
artikel |
20 |
The past, present, and future of transport-layer multipath
|
Habib, Sana |
|
2016 |
75 |
C |
p. 236-258 23 p. |
artikel |
21 |
The rise of “malware”: Bibliometric analysis of malware study
|
Razak, Mohd Faizal Ab |
|
2016 |
75 |
C |
p. 58-76 19 p. |
artikel |
22 |
To move or not to move: Cost optimization in a dual cloud-based storage architecture
|
Mansouri, Yaser |
|
2016 |
75 |
C |
p. 223-235 13 p. |
artikel |
23 |
Towards an open source architecture for multi-operator LTE core networks
|
Marco Alaez, Ricardo |
|
2016 |
75 |
C |
p. 101-109 9 p. |
artikel |
24 |
Towards native code offloading based MCC frameworks for multimedia applications: A survey
|
Shuja, Junaid |
|
2016 |
75 |
C |
p. 335-354 20 p. |
artikel |
25 |
Towards scalable security analysis using multi-layered security models
|
Hong, Jin B. |
|
2016 |
75 |
C |
p. 156-168 13 p. |
artikel |
26 |
Workflow-supported social networks: Discovery, analyses, and system
|
Park, Minjae |
|
2016 |
75 |
C |
p. 355-373 19 p. |
artikel |