nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A global architecture for the Wi-family
|
Pujolle, Guy |
|
2006 |
|
2-3 |
p. 163-173 |
artikel |
2 |
Analysis of IPv6 handovers in IEEE 802.16 environment
|
Mrugalski, Tomasz |
|
2009 |
|
2-3 |
p. 191-204 |
artikel |
3 |
Analysis of service platforms by a portfolio approach
|
Zoric, Josip |
|
2009 |
|
2-3 |
p. 227-247 |
artikel |
4 |
An application‐ and management‐based approach to ATM scheduling
|
Le Pocher, Hervé |
|
1999 |
|
2-3 |
p. 103-122 |
artikel |
5 |
An efficient group key management protocol using code for key calculation: CKC
|
Hajyvahabzadeh, Melisa |
|
2011 |
|
2-3 |
p. 115-123 |
artikel |
6 |
An enhancement to the IEEE 802.11e EDCA providing QoS guarantees
|
Hamidian, Ali |
|
2006 |
|
2-3 |
p. 195-212 |
artikel |
7 |
A new metric model for trustworthiness of softwares
|
Tao, Hongwei |
|
2011 |
|
2-3 |
p. 95-105 |
artikel |
8 |
A new worm propagation threat in BitTorrent: modeling and analysis
|
Hatahet, Sinan |
|
2009 |
|
2-3 |
p. 95-109 |
artikel |
9 |
An image-reject down-converter for 802.11a and HIPERLAN2 wireless LANs
|
Ragonese, Egidio |
|
2006 |
|
2-3 |
p. 105-115 |
artikel |
10 |
An integrated GA–LP approach to communication network design
|
Berry, L.T.M. |
|
1999 |
|
2-3 |
p. 265-280 |
artikel |
11 |
Application of the many sources asymptotic and effective bandwidths to traffic engineering
|
Courcoubetis, Costas |
|
1999 |
|
2-3 |
p. 167-191 |
artikel |
12 |
A shared secret-based algorithm for securing the OLSR routing protocol
|
Fourati, Alia |
|
2006 |
|
2-3 |
p. 213-226 |
artikel |
13 |
A tabu search algorithm for routing optimization in mobile ad-hoc networks
|
Jang, Kil-Woong |
|
2011 |
|
2-3 |
p. 177-191 |
artikel |
14 |
A vertical Path Computation Element (PCE) based path provisioning scheme in multilayer optical networks
|
Kim, Hyuncheol |
|
2011 |
|
2-3 |
p. 107-113 |
artikel |
15 |
Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources
|
Kang, Koohong |
|
1999 |
|
2-3 |
p. 123-147 |
artikel |
16 |
Burst loss and delay in optical buffers with offset-time management
|
Inghelbrecht, Veronique |
|
2006 |
|
2-3 |
p. 247-258 |
artikel |
17 |
Conception approach of access control in heterogeneous information systems using UML
|
Poniszewska-Maranda, Aneta |
|
2009 |
|
2-3 |
p. 177-190 |
artikel |
18 |
Controlled elements for designing ciphers suitable to efficient VLSI implementation
|
Moldovyan, A. A. |
|
2006 |
|
2-3 |
p. 149-163 |
artikel |
19 |
Criteria for optimizing laser launch conditions in 10 Gb/s links using OM3 fibers
|
Risteski, Aleksandar |
|
2006 |
|
2-3 |
p. 117-129 |
artikel |
20 |
Defending the weakest link: phishing websites detection by analysing user behaviours
|
Dong, Xun |
|
2010 |
|
2-3 |
p. 215-226 |
artikel |
21 |
Developing wireless sensor network applications in a virtual environment
|
Boers, Nicholas M. |
|
2010 |
|
2-3 |
p. 165-176 |
artikel |
22 |
3D Visualization on mobile devices
|
Mosmondor, Miran |
|
2006 |
|
2-3 |
p. 181-191 |
artikel |
23 |
Editorial
|
Girard, André |
|
1999 |
|
2-3 |
p. 101-102 |
artikel |
24 |
Editorial
|
Perros, Harry |
|
2006 |
|
2-3 |
p. 111-113 |
artikel |
25 |
Enabling Lego robots to communicate via infrared routing
|
Lee, Daesung |
|
2011 |
|
2-3 |
p. 125-136 |
artikel |
26 |
Evaluating a cross-layer approach for routing in Wireless Mesh Networks
|
Iannone, Luigi |
|
2006 |
|
2-3 |
p. 173-193 |
artikel |
27 |
Fuzzy generalized network approach for solving an optimization model for routing in B‐ISDN
|
Aboelela, Emad |
|
1999 |
|
2-3 |
p. 237-263 |
artikel |
28 |
GTHBAC: A Generalized Temporal History Based Access Control Model
|
Ravari, Ali Noorollahi |
|
2009 |
|
2-3 |
p. 111-125 |
artikel |
29 |
Guest editorial
|
Szczypiorski, Krzysztof |
|
2009 |
|
2-3 |
p. 93-94 |
artikel |
30 |
Guest Editorial
|
Matijasevic, Maja |
|
2006 |
|
2-3 |
p. 103-104 |
artikel |
31 |
Information system security compliance to FISMA standard: a quantitative measure
|
Hulitt, Elaine |
|
2009 |
|
2-3 |
p. 139-152 |
artikel |
32 |
Intelligent tutoring interoperability for the new web
|
Rosić, Marko |
|
2006 |
|
2-3 |
p. 193-207 |
artikel |
33 |
Introduction
|
Lee, Donghwi |
|
2011 |
|
2-3 |
p. 93 |
artikel |
34 |
LACK—a VoIP steganographic method
|
Mazurczyk, Wojciech |
|
2009 |
|
2-3 |
p. 153-163 |
artikel |
35 |
Mobile agent based framework for mobile ubiquitous application development
|
Lee, Seungkeun |
|
2011 |
|
2-3 |
p. 137-146 |
artikel |
36 |
Modeling and performance analysis of IP access interface in optical transmission networks with packet switching
|
Lackovic, M. |
|
2006 |
|
2-3 |
p. 131-148 |
artikel |
37 |
Modeling UML sequence diagrams using extended Petri nets
|
Yang, Nianhua |
|
2011 |
|
2-3 |
p. 147-158 |
artikel |
38 |
Modelling MNO and MVNO’s dynamic interconnection relations: is cooperative content investment profitable for both providers?
|
Cadre, Hélène Le |
|
2011 |
|
2-3 |
p. 193-217 |
artikel |
39 |
On SCTP multi-homing performance
|
Jungmaier, Andreas |
|
2006 |
|
2-3 |
p. 141-161 |
artikel |
40 |
On the validation of system dynamics type simulation models
|
Qudrat-Ullah, Hassan |
|
2011 |
|
2-3 |
p. 159-166 |
artikel |
41 |
Overview on telecommunications regulation framework in south-eastern Europe
|
Verikoukis, Ch. |
|
2006 |
|
2-3 |
p. 209-221 |
artikel |
42 |
Packet level performance analysis of a packet scheduler exploiting multiuser diversity
|
Hwang, Gang Uk |
|
2009 |
|
2-3 |
p. 249-258 |
artikel |
43 |
Performance analysis of limited-range wavelength conversion in an OBS switch
|
Puttasubbappa, Vishwas S. |
|
2006 |
|
2-3 |
p. 227-246 |
artikel |
44 |
Performance evaluation of the rate‐based flow control mechanism for ABR service
|
Ait‐Hellal, O. |
|
1999 |
|
2-3 |
p. 211-236 |
artikel |
45 |
Profit-oriented resource allocation using online scheduling in flexible heterogeneous networks
|
Xu, Peng |
|
2006 |
|
2-3 |
p. 289-303 |
artikel |
46 |
Project scheduling conflict identification and resolution using genetic algorithms (GA)
|
Ramzan, Muhammad |
|
2011 |
|
2-3 |
p. 167-175 |
artikel |
47 |
Queueing analysis of a single-wavelength Fiber-Delay-Line buffer
|
Laevens, K. |
|
2006 |
|
2-3 |
p. 259-287 |
artikel |
48 |
Real-time automated risk assessment in protected core networking
|
Wrona, Konrad |
|
2010 |
|
2-3 |
p. 205-214 |
artikel |
49 |
Simulation‐based results of weighted fair queuing algorithms for ATM networks
|
Guillemin, Fabrice |
|
1999 |
|
2-3 |
p. 149-166 |
artikel |
50 |
Theoretical analysis of the SABUL congestion control algorithm
|
Oothongsap, Phoemphun |
|
2006 |
|
2-3 |
p. 115-139 |
artikel |
51 |
Towards the realisation of context-risk-aware access control in pervasive computing
|
Ahmed, Ali |
|
2009 |
|
2-3 |
p. 127-137 |
artikel |
52 |
Traffic management for connectionless services over ATM
|
Rougier, J.L. |
|
1999 |
|
2-3 |
p. 193-210 |
artikel |
53 |
Video object transmission by means of virtual reality based object extraction
|
Bandera, J. P. |
|
2006 |
|
2-3 |
p. 165-180 |
artikel |