|
Journals in DBLP
Using social networks to distort users' profiles generated by web search engines. [Citation Graph (, )][DBLP]
A network rate management protocol with TCP congestion control and fairness for all. [Citation Graph (, )][DBLP]
An online framework for catching top spreaders and scanners. [Citation Graph (, )][DBLP]
A new design for end-to-end proportional loss differentiation in IP networks. [Citation Graph (, )][DBLP]
Using current web page structure to improve prefetching performance. [Citation Graph (, )][DBLP]
A transmission control SCTP for real-time multimedia streaming. [Citation Graph (, )][DBLP]
On the capacity of multi-packet reception enabled multi-channel multi-interface wireless networks. [Citation Graph (, )][DBLP]
HPC5: An efficient topology generation mechanism for Gnutella networks. [Citation Graph (, )][DBLP]
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks. [Citation Graph (, )][DBLP]
An environment-aware mobility model for wireless ad hoc network. [Citation Graph (, )][DBLP]
A model based approach for improving router geolocation. [Citation Graph (, )][DBLP]
Vulnerability analysis of RFID protocols for tag ownership transfer. [Citation Graph (, )][DBLP]
Discriminatory processor sharing queues with stationary ergodic service times and the performance of TCP in overload. [Citation Graph (, )][DBLP]
An efficient user authentication and key exchange protocol for mobile client-server environment. [Citation Graph (, )][DBLP]
|