Journals in DBLP
Abdullah Balamash , Marwan Krunz , Philippe Nain Performance analysis of a client-side caching/prefetching system for Web traffic. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3673-3692 [Journal ] Saumitra M. Das , Himabindu Pucha , Y. Charlie Hu On the scalability of rendezvous-based location services for geographic wireless ad hoc routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3693-3714 [Journal ] Mohamed G. Gouda , Alex X. Liu , Lok M. Leung , Mohamed A. Alam SPP: An anti-phishing single password protocol. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3715-3726 [Journal ] Serdar Vural , Eylem Ekici Probability distribution of multi-hop-distance in one-dimensional sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3727-3749 [Journal ] Issa Khalil , Saurabh Bagchi , Ness B. Shroff LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3750-3772 [Journal ] Marios Lestas , Andreas Pitsillides , Petros A. Ioannou , George Hadjipollas Adaptive congestion protocol: A congestion control protocol with learning capability. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3773-3798 [Journal ] Sakib A. Mondal , Faisal B. Luqman Improving TCP performance over wired-wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3799-3811 [Journal ] Baek-Young Choi , Sue B. Moon , Zhi-Li Zhang , Konstantina Papagiannaki , Christophe Diot Analysis of point-to-point packet delay in an operational network. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3812-3827 [Journal ] Zhi Li , Lihua Yuan , Prasant Mohapatra , Chen-Nee Chuah On the analysis of overlay failure detection and recovery. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3828-3843 [Journal ] Allen B. Downey TCP self-clocking and bandwidth sharing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3844-3863 [Journal ] Anat Bremler-Barr , Nir Halachmi , Hanoch Levy Protecting bursty applications against traffic aggressiveness. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3864-3877 [Journal ] Nizar Bouabdallah , Harry Perros Cost-effective single-hub WDM ring networks: A proposal and analysis. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3878-3901 [Journal ] Ignacio Más Ivars , Gunnar Karlsson Probe-based admission control for a differentiated-services internet. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3902-3918 [Journal ] Yongxiang Zhao , Changjia Chen A redundant overbooking reservation algorithm for OBS/OPS networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3919-3934 [Journal ] Animesh Patcha , Jung-Min Park Network anomaly detection with incomplete audit data. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3935-3955 [Journal ]