Journals in DBLP
Wesam Al Mobaideen , Hani Mahmoud Mimi , Fawaz Ahmad Masoud , Emad Qaddoura Performance evaluation of multicast ad hoc on-demand distance vector protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:1931-1941 [Journal ] Ronaldo M. Salles , Vitor G. Rolla Efficient Routing Heuristics for Internet Traffic Engineering. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:1942-1952 [Journal ] Sonia Ben Rejeb , Nidal Nasser , Zièd Choukair , Sami Tabbane Modeling end-to-end QoS management and real time agreement protocols for resource reservation for multimedia mobile radio network. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:1953-1963 [Journal ] Michael Chorzempa , Jung Min Park , Mohamed Eltoweissy Key management for long-lived sensor networks in hostile environments. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:1964-1979 [Journal ] Nischal M. Piratla , Anura P. Jayasumana , Abhijit A. Bare , Tarun Banka Reorder buffer-occupancy density and its application for measurement and evaluation of packet reordering. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:1980-1993 [Journal ] Chiping Tang , Philip K. McKinley Topology-aware overlay path probing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:1994-2009 [Journal ] El-Sayed M. El-Alfy Applications of genetic algorithms to optimal multilevel design of MPLS-based networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2010-2020 [Journal ] Abdorasoul Ghasemi , Karim Faez Jointly rate and power control in contention based MultiHop Wireless Networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2021-2031 [Journal ] Yeu-Pong Lai , Po-Lun Hsia Using the vulnerability information of computer systems to improve the network security. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2032-2047 [Journal ] Tetsuji Yamaguchi , Yutaka Takahashi A queue management algorithm for fair bandwidth allocation. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2048-2059 [Journal ] Jun Zheng , Yan Zhang , Ling Wang , Jinlin Chen Adaptive location update area design for wireless cellular networks under 2D Markov walk model. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2060-2069 [Journal ] Jiann-Liang Chen , Ming-Chiao Chen , Chien-Wu Chen , Yao-Chung Chang Architecture design and performance evaluation of RFID object tracking systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2070-2086 [Journal ] Yang Liu , Yu-Kwong Kwok , Jianzhou Wang An adaptive packet scheduling algorithm for efficient downlink bandwidth allocation in UWB based wireless infrastructure networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2087-2095 [Journal ] Yanxing Zheng , Turgay Korkmaz , Wenhua Dou Two additive-constrained path selection in the presence of inaccurate state information. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2096-2112 [Journal ] Marcos Postigo-Boix , José Luis Melús-Moreno Performance evaluation of RSVP extensions for a guaranteed delivery scenario. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2113-2121 [Journal ] Hyung Seok Kim , Sooyoung Yang Tiny MAP: An efficient MAP in IEEE 802.16/WiMAX broadband wireless access systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2122-2128 [Journal ] Song Guo , Oliver W. W. Yang Energy-aware multicasting in wireless ad hoc networks: A survey and discussion. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:9, pp:2129-2148 [Journal ]