Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive study of the use of advertisements as incentives in P2P streaming systems Wang, Bo-Chun
2012
7 4 p. 555-571
artikel
2 A D-S evidence theory based fuzzy trust model in file-sharing P2P networks Tian, Chunqi
2012
7 4 p. 332-345
artikel
3 Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN Chen, Joy Iong-Zong
2013
7 4 p. 710-722
artikel
4 An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment Shin, Soobok
2013
7 4 p. 612-619
artikel
5 An efficient ECC-based mechanism for securing network coding-based P2P content distribution He, Heng
2013
7 4 p. 572-589
artikel
6 An ISP-friendly inter-overlay coordination framework for multiple coexisting P2P systems Yang, Peng
2013
7 4 p. 396-409
artikel
7 Anonymous proximity mobile payment (APMP) Almuairfi, Sadiq
2012
7 4 p. 620-627
artikel
8 A novel method of mining network flow to detect P2P botnets Lin, Shu-Chiung
2012
7 4 p. 645-654
artikel
9 A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems Jung, Yung-Joon
2013
7 4 p. 665-675
artikel
10 A research on dynamic allocation of network resources based on P2P traffic planning Ma, Dongchao
2012
7 4 p. 511-524
artikel
11 A scalable P2P overlay based on arrangement graph with minimized overhead Lu, Ssu-Hsuan
2013
7 4 p. 497-510
artikel
12 BufferBank: A distributed cache infrastructure for peer-to-peer application Huang, Bin
2012
7 4 p. 485-496
artikel
13 Detecting P2P botnets by discovering flow dependency in C&C traffic Jiang, Hongling
2012
7 4 p. 320-331
artikel
14 Distributed Denial of Service (DDoS) detection by traffic pattern analysis Thapngam, Theerasak
2012
7 4 p. 346-358
artikel
15 Editor’s Note: Special issue on Technologies and Theories in P2P Converged Ubiquitous Networks 2014
7 4 p. 611
artikel
16 Exposing mobile malware from the inside (or what is your mobile app really doing?) Damopoulos, Dimitrios
2012
7 4 p. 687-697
artikel
17 Group formation with neighbor similarity trust in P2P E-commerce Musau, Felix
2011
7 4 p. 295-310
artikel
18 Hierarchical architectures in structured peer-to-peer overlay networks Korzun, Dmitry
2013
7 4 p. 359-395
artikel
19 Hybrid fluid modeling approach for performance analysis of P2P live video streaming systems Kotevski, Zoran
2013
7 4 p. 410-426
artikel
20 Image reversibility in data embedding on the basis of blocking-predictions Hsu, Fu-Hau
2013
7 4 p. 723-736
artikel
21 Improving sustainability of BitTorrent darknets Chen, Xiaowei
2012
7 4 p. 539-554
artikel
22 Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks Kalkan, Kubra
2012
7 4 p. 698-709
artikel
23 Low-priced and efficient replica detection framework for wireless sensor networks Cho, Kwantae
2012
7 4 p. 743-749
artikel
24 Modeling the initial stage of a file sharing process on a BitTorrent network Lai, Pierre K. Y.
2011
7 4 p. 311-319
artikel
25 Modelling and performance analysis of content sharing and distribution in community networks with infrastructure support Alasaad, Amr
2012
7 4 p. 590-610
artikel
26 On the collaboration of different peer-to-peer traffic management schemas Liu, Xin
2012
7 4 p. 459-468
artikel
27 Peer-to-peer as an infrastructure service Liu, Jiangchuan
2014
7 4 p. 456-458
artikel
28 P2P storage systems: Study of different placement policies Caron, Stéphane
2013
7 4 p. 427-443
artikel
29 Router architecture evaluation for security network Choi, Yungho
2012
7 4 p. 628-635
artikel
30 Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks Park, Joon-Sang
2012
7 4 p. 737-742
artikel
31 Security analysis of block cipher Piccolo suitable for wireless sensor networks Jeong, Kitae
2013
7 4 p. 636-644
artikel
32 SocialTrust: Enabling long-term social cooperation in peer-to-peer services Hu, Yusuo
2013
7 4 p. 525-538
artikel
33 The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks Hwang, Ren-Junn
2012
7 4 p. 655-664
artikel
34 The performance and locality tradeoff in bittorrent-like file sharing systems Huang, Wei
2013
7 4 p. 469-484
artikel
35 Tsunami: A parasitic, indestructible botnet on Kad Memon, Ghulam
2013
7 4 p. 444-455
artikel
36 VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems Wang, Wei-Jen
2013
7 4 p. 676-686
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland