The SCEAS System
Navigation Menu

Journals in DBLP

Computer Networks
2007, volume: 51, number: 3

  1. B. Praveen, J. Praveen, C. Siva Ram Murthy
    On using forward error correction for loss recovery in optical burst switched networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:559-568 [Journal]
  2. Carlo K. da S. Rodrigues, Rosa M. M. Leão
    Bandwidth usage distribution of multimedia servers using Patching. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:569-587 [Journal]
  3. Yeim-Kuan Chang
    Fast binary and multiway prefix searches for packet forwarding. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:588-605 [Journal]
  4. Sungchang Kim, Young-Chon Kim, Bin-Yeong Yoon, Minho Kang
    An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:606-620 [Journal]
  5. Young-June Choi, Jin-Ghoo Choi, Saewoong Bahk
    Upper-level scheduling supporting multimedia traffic in cellular data networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:621-631 [Journal]
  6. Dong Yu, Deborah A. Frincke
    Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:632-654 [Journal]
  7. Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda
    Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal]
  8. Hailong Li, Ian Li-Jin Thng
    Performance analysis of limited number of wavelength converters by share per node in optical switching network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:671-682 [Journal]
  9. Péter Hága, Krisztián Diriczi, Gábor Vattay, István Csabai
    Granular model of packet pair separation in Poissonian traffic. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:683-698 [Journal]
  10. Jean Marc Kelif, Eitan Altman, Ioannis Z. Koukoutsidis
    Admission and GoS control in a multiservice WCDMA system. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:699-711 [Journal]
  11. Yuh-Jzer Joung, Jiaw-Chang Wang
    Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:712-731 [Journal]
  12. Zhiqiang Gao, Nirwan Ansari
    A practical and robust inter-domain marking scheme for IP traceback. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:732-750 [Journal]
  13. Glenn S. Benson
    Portable security transaction protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:751-766 [Journal]
  14. Meng Chang Chen, Li-Ping Tung, Yeali S. Sun, Wei-Kuan Shih
    A new per-class flow fixed proportional differentiated service for multi-service wireless LAN. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:767-780 [Journal]
  15. Michel Mandjes, Petteri Mannersalo, Ilkka Norros
    Gaussian tandem queues with an application to dimensioning of switch fabric interfaces. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:781-797 [Journal]
  16. Zhenqiang Ye, Lap Kong Law, Srikanth V. Krishnamurthy, Zhong Xu, Suvidhean Dhirakaosal, Satish K. Tripathi, Mart Molle
    Predictive channel reservation for handoff prioritization in wireless cellular networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:798-822 [Journal]
  17. Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos
    A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:823-834 [Journal]
  18. Sergio Sánchez-López, Xavier Masip-Bruin, Josep Solé-Pareta, Jordi Domingo-Pascual
    Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:835-852 [Journal]
  19. Jianping Pan, Lin Cai, Xuemin Shen, Jon W. Mark
    Identity-based secure collaboration in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:853-865 [Journal]
  20. Jen-Shiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung
    Dynamic probabilistic packet marking for efficient IP traceback. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:866-882 [Journal]
  21. Yuh-Ren Tsai, Shiuh-Jeng Wang
    Two-tier authentication for cluster and individual sets in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:883-900 [Journal]
  22. Ernst W. Biersack, Damiano Carra, Renato Lo Cigno, Pablo Rodriguez, Pascal Felber
    Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:901-917 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002