The SCEAS System
Navigation Menu

Journals in DBLP

Computer Networks
2007, volume: 51, number: 12

  1. Ahsan Habib, John Chuang
    Improving application QoS with residential multihoming. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3323-3337 [Journal]
  2. Soo Young Shin, Hong Seong Park, Wook Hyun Kwon
    Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3338-3353 [Journal]
  3. Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen
    A longest prefix first search tree for IP lookup. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3354-3367 [Journal]
  4. Jiann-Liang Chen, Ming-Chiao Chen, Yi-Ru Chian
    QoS management in heterogeneous home networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3368-3379 [Journal]
  5. Sumit Naiksatam, Stephen A. Chiappari, Silvia Figueira
    Efficient bandwidth utilization in LambdaGrids using pricing incentives. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3380-3391 [Journal]
  6. Vinay Sridhara, Stephan Bohacek
    Realistic propagation simulation of urban mesh networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3392-3412 [Journal]
  7. Luis López, Antonio Fernández, Vicent Cholvi
    A game theoretic comparison of TCP and digital fountain based protocols. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3413-3426 [Journal]
  8. Saravanan Balasubramanian, Demet Aksoy
    Adaptive energy-efficient registration and online scheduling for asymmetric wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3427-3447 [Journal]
  9. Animesh Patcha, Jung-Min Park
    An overview of anomaly detection techniques: Existing solutions and latest technological trends. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3448-3470 [Journal]
  10. Spyros Antonatos, P. Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis
    Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3471-3490 [Journal]
  11. Stylianos Karapantazis, Fotini-Niovi Pavlidou
    Call admission control in multiservice high altitude platform (HAP) W-CDMA cellular systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3491-3506 [Journal]
  12. Grigorios Zachariadis, Javier A. Barria
    Demand management for telecommunications services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3507-3524 [Journal]
  13. Ritesh Mukherjee, J. William Atwood
    Scalable solutions for secure group communications. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3525-3548 [Journal]
  14. Christos Bouras, Afrodite Sevasti
    An analytical QoS service model for delay-based differentiation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3549-3563 [Journal]
  15. Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
    A queueing analysis for the denial of service (DoS) attacks in computer networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3564-3573 [Journal]
  16. W.-Y. Tam, King-Shan Lui, Suleyman Uludag, Klara Nahrstedt
    Quality-of-Service routing with path information aggregation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3574-3594 [Journal]
  17. Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu
    The performance impact of traffic patterns on routing protocols in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3595-3616 [Journal]
  18. Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
    Cellular universal IP for nested network mobility. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3617-3631 [Journal]
  19. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Threshold cryptography in P2P and MANETs: The case of access control. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3632-3649 [Journal]
  20. Saralees Nadarajah, Samuel Kotz
    On the convolution of Pareto and gamma distributions. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3650-3654 [Journal]
  21. Do Young Eun, Xinbing Wang
    Performance analysis of TCP/AQM with generalized AIMD under intermediate buffer sizes. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3655-3671 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002