The SCEAS System
Navigation Menu

Journals in DBLP

Computer Networks
2007, volume: 51, number: 13

  1. Abdullah Balamash, Marwan Krunz, Philippe Nain
    Performance analysis of a client-side caching/prefetching system for Web traffic. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3673-3692 [Journal]
  2. Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu
    On the scalability of rendezvous-based location services for geographic wireless ad hoc routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3693-3714 [Journal]
  3. Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam
    SPP: An anti-phishing single password protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3715-3726 [Journal]
  4. Serdar Vural, Eylem Ekici
    Probability distribution of multi-hop-distance in one-dimensional sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3727-3749 [Journal]
  5. Issa Khalil, Saurabh Bagchi, Ness B. Shroff
    LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3750-3772 [Journal]
  6. Marios Lestas, Andreas Pitsillides, Petros A. Ioannou, George Hadjipollas
    Adaptive congestion protocol: A congestion control protocol with learning capability. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3773-3798 [Journal]
  7. Sakib A. Mondal, Faisal B. Luqman
    Improving TCP performance over wired-wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3799-3811 [Journal]
  8. Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konstantina Papagiannaki, Christophe Diot
    Analysis of point-to-point packet delay in an operational network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3812-3827 [Journal]
  9. Zhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah
    On the analysis of overlay failure detection and recovery. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3828-3843 [Journal]
  10. Allen B. Downey
    TCP self-clocking and bandwidth sharing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3844-3863 [Journal]
  11. Anat Bremler-Barr, Nir Halachmi, Hanoch Levy
    Protecting bursty applications against traffic aggressiveness. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3864-3877 [Journal]
  12. Nizar Bouabdallah, Harry Perros
    Cost-effective single-hub WDM ring networks: A proposal and analysis. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3878-3901 [Journal]
  13. Ignacio Más Ivars, Gunnar Karlsson
    Probe-based admission control for a differentiated-services internet. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3902-3918 [Journal]
  14. Yongxiang Zhao, Changjia Chen
    A redundant overbooking reservation algorithm for OBS/OPS networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3919-3934 [Journal]
  15. Animesh Patcha, Jung-Min Park
    Network anomaly detection with incomplete audit data. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3935-3955 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002