The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2008, volume: 31, number: 15


  1. Cross-layer multiuser resource allocation for video communication over OFDM networks. [Citation Graph (, )][DBLP]


  2. QoS multicast aggregation under multiple additive constraints. [Citation Graph (, )][DBLP]


  3. Adaptive data aggregation scheme in clustered wireless sensor networks. [Citation Graph (, )][DBLP]


  4. A mailbox ownership based mechanism for curbing spam. [Citation Graph (, )][DBLP]


  5. Simplified fast handover in mobile IPv6 networks. [Citation Graph (, )][DBLP]


  6. Analysis and placement of storage capacity in large distributed video servers. [Citation Graph (, )][DBLP]


  7. Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints. [Citation Graph (, )][DBLP]


  8. Dynamic Power Management with Scheduled Switching Modes. [Citation Graph (, )][DBLP]


  9. Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control. [Citation Graph (, )][DBLP]


  10. Balancing intrusion detection resources in ubiquitous computing networks. [Citation Graph (, )][DBLP]


  11. Modeling and performance analysis of realizable optical queue with service differentiation capability. [Citation Graph (, )][DBLP]


  12. Protocols for purpose-restricted anonymous communications in IP-based wireless networks. [Citation Graph (, )][DBLP]


  13. CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast. [Citation Graph (, )][DBLP]


  14. An enhancement of TCP Veno with forward acknowledgement. [Citation Graph (, )][DBLP]


  15. Risk assessment in practice: A real case study. [Citation Graph (, )][DBLP]


  16. Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks. [Citation Graph (, )][DBLP]


  17. A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6). [Citation Graph (, )][DBLP]


  18. Security weakness in an authenticated group key agreement protocol in two rounds. [Citation Graph (, )][DBLP]


  19. Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002