The SCEAS System
Navigation Menu

Journals in DBLP

Computer Networks
2007, volume: 51, number: 10

  1. Jelena Misic, Carol J. Fung
    The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2411-2449 [Journal]
  2. Yigal Bejerano, Seung-Jae Han, Amit Kumar
    Efficient load-balancing routing for wireless mesh networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2450-2466 [Journal]
  3. Guoqiang Mao, Brian D. O. Anderson, Baris Fidan
    Path loss exponent estimation for wireless sensor network localization. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2467-2483 [Journal]
  4. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker
    Design and implementation of a secure wide-area object middleware. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2484-2513 [Journal]
  5. Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang
    Mobility analysis of mobile hosts with random walking in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2514-2528 [Journal]
  6. Guoqiang Mao, Baris Fidan, Brian D. O. Anderson
    Wireless sensor network localization techniques. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2529-2553 [Journal]
  7. Ning Lu, John Bigham
    On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2554-2564 [Journal]
  8. Birger Tödtmann, Erwin P. Rathgeb
    Anticipatory distributed packet filter configurations for carrier-grade IP networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2565-2579 [Journal]
  9. Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis
    A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal]
  10. Vasudev Shah, Ece Gelal, Srikanth V. Krishnamurthy
    Handling asymmetry in power heterogeneous ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2594-2615 [Journal]
  11. Zhenhai Duan, Yingfei Dong, Kartik Gopalan
    DMTP: Controlling spam through message delivery differentiation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2616-2630 [Journal]
  12. Ibtissam El Khayat, Pierre Geurts, Guy Leduc
    Machine-learnt versus analytical models of TCP throughput. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2631-2644 [Journal]
  13. Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femminella, Gianluca Reali
    Autonomic control and personalization of a wireless access network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2645-2676 [Journal]
  14. Andrey Belenky, Nirwan Ansari
    On deterministic packet marking. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2677-2700 [Journal]
  15. Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li Zhang, Christophe Diot
    Quantile sampling for practical delay monitoring in Internet backbone networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2701-2716 [Journal]
  16. Aleksandar Kuzmanovic, Edward W. Knightly
    Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2717-2737 [Journal]
  17. Marco Ajmone Marsan, Claudio Casetti, G. Mardente, Marco Mellia
    A framework for admission control and path allocation in DiffServ networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2738-2752 [Journal]
  18. Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng
    Improving the resilience of content distribution networks to large scale distributed denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2753-2770 [Journal]
  19. Sun-Myeng Kim, Young-Jong Cho
    Channel time allocation scheme based on feedback information in IEEE 802.11e wireless LANs. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2771-2787 [Journal]
  20. Yujie Zhu, Aravind Velayutham, Oyebamiji Oladeji, Raghupathy Sivakumar
    Enhancing TCP for networks with guaranteed bandwidth services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2788-2804 [Journal]
  21. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
    Secure multicast in dynamic environments. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2805-2817 [Journal]
  22. Shudong Jin, Hongbo Jiang
    Novel approaches to efficient flooding search in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2818-2832 [Journal]
  23. Jocelyne Elias, Fabio Martignon, Antonio Capone, Guy Pujolle
    A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2833-2853 [Journal]
  24. Srinivasan Ramasubramanian, Mithun Harkara, Marwan Krunz
    Linear time distributed construction of colored trees for disjoint multipath routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2854-2866 [Journal]
  25. Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley
    Performance modeling of epidemic routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2867-2891 [Journal]
  26. Pablo Vidales, Carlos Jesus Bernardos, Ignacio Soto, David Cottingham, Javier Baliosian, Jon Crowcroft
    MIPv6 experimental evaluation using overlay networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2892-2915 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002