Journals in DBLP
M. Masoom Ali , Saralees Nadarajah A truncated Pareto distribution. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:1-4 [Journal ] Jane Yang Yu , Peter Han Joo Chong An efficient clustering scheme for large and dense mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:5-16 [Journal ] Mário Alves , Eduardo Tovar Engineering PROFIBUS networks with heterogeneous transmission media. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:17-32 [Journal ] Masayoshi Nabeshima S-shaped TCP: A transport protocol for improving the performance of TCP in fast long-distance networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:33-40 [Journal ] Salman AlQahtani , Ashraf S. Mahmoud Dynamic radio resource allocation for 3G and beyond mobile wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:41-51 [Journal ] J. Munilla , A. Peinado Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:52-54 [Journal ] Miao Ma Resilience of sink filtering scheme in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:55-65 [Journal ] Alejandro Quintero , Samuel Pierre , Larbi Alaoui A mobility management model based on users' mobility profiles for IPv6 networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:66-80 [Journal ] Moonjeong Chang , Meejeong Lee , Hyunjeong Lee An RSVP based seamless resource reservation scheme for wireless mobile networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:81-92 [Journal ] Yun Wang , Inyoung Kim , Gaston Mbateng , Shih-Yieh Ho A latent class modeling approach to detect network intrusion. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:93-100 [Journal ] Mohammed S. Zahrani , Martin J. Loomes , James A. Malcolm , Andreas Alexander Albrecht Landscape analysis for multicast routing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:101-116 [Journal ] Kyung-Ah Shim Security flaws of remote user access over insecure networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:117-121 [Journal ] Q. Liu , M. A. Kok , N. Ghani , Ashwin Gumaste Hierarchical routing in multi-domain optical networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:122-131 [Journal ] Yin-Fu Huang , Tsung-Yi Chiu Radio resource management for a mobile network with TD-CDMA. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:132-143 [Journal ] Ping Wang , Yunze Cai , Jinjie Huang , Xiaoming Xu A hierarchical multicast protocol in mobile IPv6 networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:144-152 [Journal ] Suk-Bok Lee , Yoon-Hwa Choi A secure alternate path routing in sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:153-165 [Journal ] Yun Won Chung , Ho Young Hwang , Dan Keun Sung Modeling and analysis of mobility management state of packet-switched (PS) services in GPRS. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:166-177 [Journal ] Iman Almomani , Marwan Al-Akaidi , P. Reynolds , Jon Ivins Architectural framework for wireless mobile ad hoc networks (AF WMANETs). [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:178-191 [Journal ] Arumugam Nallanathan , Wang Feng , Hari Krishna Garg Coexistence of wireless LANs and Bluetooth networks in mutual interference environment: An integrated analysis. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:192-201 [Journal ] Chang Wook Ahn Gathering-based routing protocol in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:202-206 [Journal ]