Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             53 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A global architecture for the Wi-family Pujolle, Guy
2006
2-3 p. 163-173
artikel
2 Analysis of IPv6 handovers in IEEE 802.16 environment Mrugalski, Tomasz
2009
2-3 p. 191-204
artikel
3 Analysis of service platforms by a portfolio approach Zoric, Josip
2009
2-3 p. 227-247
artikel
4 An application‐ and management‐based approach to ATM scheduling Le Pocher, Hervé
1999
2-3 p. 103-122
artikel
5 An efficient group key management protocol using code for key calculation: CKC Hajyvahabzadeh, Melisa
2011
2-3 p. 115-123
artikel
6 An enhancement to the IEEE 802.11e EDCA providing QoS guarantees Hamidian, Ali
2006
2-3 p. 195-212
artikel
7 A new metric model for trustworthiness of softwares Tao, Hongwei
2011
2-3 p. 95-105
artikel
8 A new worm propagation threat in BitTorrent: modeling and analysis Hatahet, Sinan
2009
2-3 p. 95-109
artikel
9 An image-reject down-converter for 802.11a and HIPERLAN2 wireless LANs Ragonese, Egidio
2006
2-3 p. 105-115
artikel
10 An integrated GA–LP approach to communication network design Berry, L.T.M.
1999
2-3 p. 265-280
artikel
11 Application of the many sources asymptotic and effective bandwidths to traffic engineering Courcoubetis, Costas
1999
2-3 p. 167-191
artikel
12 A shared secret-based algorithm for securing the OLSR routing protocol Fourati, Alia
2006
2-3 p. 213-226
artikel
13 A tabu search algorithm for routing optimization in mobile ad-hoc networks Jang, Kil-Woong
2011
2-3 p. 177-191
artikel
14 A vertical Path Computation Element (PCE) based path provisioning scheme in multilayer optical networks Kim, Hyuncheol
2011
2-3 p. 107-113
artikel
15 Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources Kang, Koohong
1999
2-3 p. 123-147
artikel
16 Burst loss and delay in optical buffers with offset-time management Inghelbrecht, Veronique
2006
2-3 p. 247-258
artikel
17 Conception approach of access control in heterogeneous information systems using UML Poniszewska-Maranda, Aneta
2009
2-3 p. 177-190
artikel
18 Controlled elements for designing ciphers suitable to efficient VLSI implementation Moldovyan, A. A.
2006
2-3 p. 149-163
artikel
19 Criteria for optimizing laser launch conditions in 10 Gb/s links using OM3 fibers Risteski, Aleksandar
2006
2-3 p. 117-129
artikel
20 Defending the weakest link: phishing websites detection by analysing user behaviours Dong, Xun
2010
2-3 p. 215-226
artikel
21 Developing wireless sensor network applications in a virtual environment Boers, Nicholas M.
2010
2-3 p. 165-176
artikel
22 3D Visualization on mobile devices Mosmondor, Miran
2006
2-3 p. 181-191
artikel
23 Editorial Girard, André
1999
2-3 p. 101-102
artikel
24 Editorial Perros, Harry
2006
2-3 p. 111-113
artikel
25 Enabling Lego robots to communicate via infrared routing Lee, Daesung
2011
2-3 p. 125-136
artikel
26 Evaluating a cross-layer approach for routing in Wireless Mesh Networks Iannone, Luigi
2006
2-3 p. 173-193
artikel
27 Fuzzy generalized network approach for solving an optimization model for routing in B‐ISDN Aboelela, Emad
1999
2-3 p. 237-263
artikel
28 GTHBAC: A Generalized Temporal History Based Access Control Model Ravari, Ali Noorollahi
2009
2-3 p. 111-125
artikel
29 Guest editorial Szczypiorski, Krzysztof
2009
2-3 p. 93-94
artikel
30 Guest Editorial Matijasevic, Maja
2006
2-3 p. 103-104
artikel
31 Information system security compliance to FISMA standard: a quantitative measure Hulitt, Elaine
2009
2-3 p. 139-152
artikel
32 Intelligent tutoring interoperability for the new web Rosić, Marko
2006
2-3 p. 193-207
artikel
33 Introduction Lee, Donghwi
2011
2-3 p. 93
artikel
34 LACK—a VoIP steganographic method Mazurczyk, Wojciech
2009
2-3 p. 153-163
artikel
35 Mobile agent based framework for mobile ubiquitous application development Lee, Seungkeun
2011
2-3 p. 137-146
artikel
36 Modeling and performance analysis of IP access interface in optical transmission networks with packet switching Lackovic, M.
2006
2-3 p. 131-148
artikel
37 Modeling UML sequence diagrams using extended Petri nets Yang, Nianhua
2011
2-3 p. 147-158
artikel
38 Modelling MNO and MVNO’s dynamic interconnection relations: is cooperative content investment profitable for both providers? Cadre, Hélène Le
2011
2-3 p. 193-217
artikel
39 On SCTP multi-homing performance Jungmaier, Andreas
2006
2-3 p. 141-161
artikel
40 On the validation of system dynamics type simulation models Qudrat-Ullah, Hassan
2011
2-3 p. 159-166
artikel
41 Overview on telecommunications regulation framework in south-eastern Europe Verikoukis, Ch.
2006
2-3 p. 209-221
artikel
42 Packet level performance analysis of a packet scheduler exploiting multiuser diversity Hwang, Gang Uk
2009
2-3 p. 249-258
artikel
43 Performance analysis of limited-range wavelength conversion in an OBS switch Puttasubbappa, Vishwas S.
2006
2-3 p. 227-246
artikel
44 Performance evaluation of the rate‐based flow control mechanism for ABR service Ait‐Hellal, O.
1999
2-3 p. 211-236
artikel
45 Profit-oriented resource allocation using online scheduling in flexible heterogeneous networks Xu, Peng
2006
2-3 p. 289-303
artikel
46 Project scheduling conflict identification and resolution using genetic algorithms (GA) Ramzan, Muhammad
2011
2-3 p. 167-175
artikel
47 Queueing analysis of a single-wavelength Fiber-Delay-Line buffer Laevens, K.
2006
2-3 p. 259-287
artikel
48 Real-time automated risk assessment in protected core networking Wrona, Konrad
2010
2-3 p. 205-214
artikel
49 Simulation‐based results of weighted fair queuing algorithms for ATM networks Guillemin, Fabrice
1999
2-3 p. 149-166
artikel
50 Theoretical analysis of the SABUL congestion control algorithm Oothongsap, Phoemphun
2006
2-3 p. 115-139
artikel
51 Towards the realisation of context-risk-aware access control in pervasive computing Ahmed, Ali
2009
2-3 p. 127-137
artikel
52 Traffic management for connectionless services over ATM Rougier, J.L.
1999
2-3 p. 193-210
artikel
53 Video object transmission by means of virtual reality based object extraction Bandera, J. P.
2006
2-3 p. 165-180
artikel
                             53 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland