Journals in DBLP
B. Praveen , J. Praveen , C. Siva Ram Murthy On using forward error correction for loss recovery in optical burst switched networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:559-568 [Journal ] Carlo K. da S. Rodrigues , Rosa M. M. Leão Bandwidth usage distribution of multimedia servers using Patching. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:569-587 [Journal ] Yeim-Kuan Chang Fast binary and multiway prefix searches for packet forwarding. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:588-605 [Journal ] Sungchang Kim , Young-Chon Kim , Bin-Yeong Yoon , Minho Kang An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:606-620 [Journal ] Young-June Choi , Jin-Ghoo Choi , Saewoong Bahk Upper-level scheduling supporting multimedia traffic in cellular data networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:621-631 [Journal ] Dong Yu , Deborah A. Frincke Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:632-654 [Journal ] Zhiguo Wan , Robert H. Deng , Feng Bao , Akkihebbal L. Ananda Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal ] Hailong Li , Ian Li-Jin Thng Performance analysis of limited number of wavelength converters by share per node in optical switching network. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:671-682 [Journal ] Péter Hága , Krisztián Diriczi , Gábor Vattay , István Csabai Granular model of packet pair separation in Poissonian traffic. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:683-698 [Journal ] Jean Marc Kelif , Eitan Altman , Ioannis Z. Koukoutsidis Admission and GoS control in a multiservice WCDMA system. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:699-711 [Journal ] Yuh-Jzer Joung , Jiaw-Chang Wang Chord2 : A two-layer Chord for reducing maintenance overhead via heterogeneity. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:712-731 [Journal ] Zhiqiang Gao , Nirwan Ansari A practical and robust inter-domain marking scheme for IP traceback. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:732-750 [Journal ] Glenn S. Benson Portable security transaction protocol. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:751-766 [Journal ] Meng Chang Chen , Li-Ping Tung , Yeali S. Sun , Wei-Kuan Shih A new per-class flow fixed proportional differentiated service for multi-service wireless LAN. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:767-780 [Journal ] Michel Mandjes , Petteri Mannersalo , Ilkka Norros Gaussian tandem queues with an application to dimensioning of switch fabric interfaces. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:781-797 [Journal ] Zhenqiang Ye , Lap Kong Law , Srikanth V. Krishnamurthy , Zhong Xu , Suvidhean Dhirakaosal , Satish K. Tripathi , Mart Molle Predictive channel reservation for handoff prioritization in wireless cellular networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:798-822 [Journal ] Lap Kong Law , Srikanth V. Krishnamurthy , Michalis Faloutsos A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:823-834 [Journal ] Sergio Sánchez-López , Xavier Masip-Bruin , Josep Solé-Pareta , Jordi Domingo-Pascual Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:835-852 [Journal ] Jianping Pan , Lin Cai , Xuemin Shen , Jon W. Mark Identity-based secure collaboration in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:853-865 [Journal ] Jen-Shiuh Liu , Zhi-Jian Lee , Yeh-Ching Chung Dynamic probabilistic packet marking for efficient IP traceback. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:866-882 [Journal ] Yuh-Ren Tsai , Shiuh-Jeng Wang Two-tier authentication for cluster and individual sets in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:883-900 [Journal ] Ernst W. Biersack , Damiano Carra , Renato Lo Cigno , Pablo Rodriguez , Pascal Felber Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:901-917 [Journal ]