Journals in DBLP
Jelena Misic , Carol J. Fung The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2411-2449 [Journal ] Yigal Bejerano , Seung-Jae Han , Amit Kumar Efficient load-balancing routing for wireless mesh networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2450-2466 [Journal ] Guoqiang Mao , Brian D. O. Anderson , Baris Fidan Path loss exponent estimation for wireless sensor network localization. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2467-2483 [Journal ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum , Arno Bakker Design and implementation of a secure wide-area object middleware. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2484-2513 [Journal ] Supeng Leng , Liren Zhang , Huirong Fu , Jianjun Yang Mobility analysis of mobile hosts with random walking in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2514-2528 [Journal ] Guoqiang Mao , Baris Fidan , Brian D. O. Anderson Wireless sensor network localization techniques. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2529-2553 [Journal ] Ning Lu , John Bigham On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2554-2564 [Journal ] Birger Tödtmann , Erwin P. Rathgeb Anticipatory distributed packet filter configurations for carrier-grade IP networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2565-2579 [Journal ] Dimitris Geneiatakis , Georgios Kambourakis , Costas Lambrinoudakis , Tasos Dagiuklas , Stefanos Gritzalis A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal ] Vasudev Shah , Ece Gelal , Srikanth V. Krishnamurthy Handling asymmetry in power heterogeneous ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2594-2615 [Journal ] Zhenhai Duan , Yingfei Dong , Kartik Gopalan DMTP: Controlling spam through message delivery differentiation. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2616-2630 [Journal ] Ibtissam El Khayat , Pierre Geurts , Guy Leduc Machine-learnt versus analytical models of TCP throughput. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2631-2644 [Journal ] Nicola Blefari-Melazzi , Dario Di Sorte , Mauro Femminella , Gianluca Reali Autonomic control and personalization of a wireless access network. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2645-2676 [Journal ] Andrey Belenky , Nirwan Ansari On deterministic packet marking. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2677-2700 [Journal ] Baek-Young Choi , Sue B. Moon , Rene L. Cruz , Zhi-Li Zhang , Christophe Diot Quantile sampling for practical delay monitoring in Internet backbone networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2701-2716 [Journal ] Aleksandar Kuzmanovic , Edward W. Knightly Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2717-2737 [Journal ] Marco Ajmone Marsan , Claudio Casetti , G. Mardente , Marco Mellia A framework for admission control and path allocation in DiffServ networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2738-2752 [Journal ] Kang-Won Lee , Suresh Chari , Anees Shaikh , Sambit Sahu , Pau-Chen Cheng Improving the resilience of content distribution networks to large scale distributed denial of service attacks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2753-2770 [Journal ] Sun-Myeng Kim , Young-Jong Cho Channel time allocation scheme based on feedback information in IEEE 802.11e wireless LANs. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2771-2787 [Journal ] Yujie Zhu , Aravind Velayutham , Oyebamiji Oladeji , Raghupathy Sivakumar Enhancing TCP for networks with guaranteed bandwidth services. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2788-2804 [Journal ] Chun-Ying Huang , Yun-Peng Chiu , Kuan-Ta Chen , Chin-Laung Lei Secure multicast in dynamic environments. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2805-2817 [Journal ] Shudong Jin , Hongbo Jiang Novel approaches to efficient flooding search in peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2818-2832 [Journal ] Jocelyne Elias , Fabio Martignon , Antonio Capone , Guy Pujolle A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2833-2853 [Journal ] Srinivasan Ramasubramanian , Mithun Harkara , Marwan Krunz Linear time distributed construction of colored trees for disjoint multipath routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2854-2866 [Journal ] Xiaolan Zhang , Giovanni Neglia , James F. Kurose , Donald F. Towsley Performance modeling of epidemic routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2867-2891 [Journal ] Pablo Vidales , Carlos Jesus Bernardos , Ignacio Soto , David Cottingham , Javier Baliosian , Jon Crowcroft MIPv6 experimental evaluation using overlay networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2892-2915 [Journal ]