The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2008, volume: 31, number: 14


  1. Partition and multi-path transmission: An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network. [Citation Graph (, )][DBLP]


  2. A new fair marker algorithm for DiffServ networks. [Citation Graph (, )][DBLP]


  3. An optimal snap-stabilizing wave algorithm in arbitrary graphs. [Citation Graph (, )][DBLP]


  4. A closed queuing network model with multiple servers for multi-threaded architecture. [Citation Graph (, )][DBLP]


  5. Mobility prediction based on an ant system. [Citation Graph (, )][DBLP]


  6. Dynamic appointment of ABR for the OSPF routing protocol. [Citation Graph (, )][DBLP]


  7. Efficient integration OVSF code management strategies in UMTS. [Citation Graph (, )][DBLP]


  8. An efficient session key generation for NTDR networks based on bilinear paring. [Citation Graph (, )][DBLP]


  9. CollECT: Collaborative event detection and tracking in wireless heterogeneous sensor networks. [Citation Graph (, )][DBLP]


  10. Macromobility support for mobile ad hoc networks using IPv6 and the OLSR routing protocol. [Citation Graph (, )][DBLP]


  11. A cross-layer design for TCP end-to-end performance improvement in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  12. Severe congestion handling approaches in NSIS RMD domains with bi-directional reservations. [Citation Graph (, )][DBLP]


  13. Overlay multicast tree recovery scheme using a proactive approach. [Citation Graph (, )][DBLP]


  14. Optimization driven bandwidth provisioning in service overlay networks. [Citation Graph (, )][DBLP]


  15. Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks. [Citation Graph (, )][DBLP]


  16. A real-time routing protocol with load distribution in wireless sensor networks. [Citation Graph (, )][DBLP]


  17. An optimal power-saving class II for VoIP traffic and its performance evaluations in IEEE 802.16e. [Citation Graph (, )][DBLP]


  18. Timed buffers: A technique for update propagation in nomadic environments. [Citation Graph (, )][DBLP]


  19. An algorithm for k-mutual exclusion in decentralized systems. [Citation Graph (, )][DBLP]


  20. Multiuser channel estimation and prediction in two dimensions for MIMO-OFDM uplinks. [Citation Graph (, )][DBLP]


  21. A Generalized FAST TCP scheme. [Citation Graph (, )][DBLP]


  22. An improved address ownership in mobile IPv6. [Citation Graph (, )][DBLP]


  23. A QoS framework to support integrated services in multihop wireless networks with infrastructure support. [Citation Graph (, )][DBLP]


  24. Utilizing the synchrony among base stations for better performance of channel assignment algorithms. [Citation Graph (, )][DBLP]


  25. The handoff control scheme for computing powerless devices and its applications in the digital home network. [Citation Graph (, )][DBLP]


  26. A random graph-based model to analyze packet interference between frequency hopping systems with an application to Bluetooth. [Citation Graph (, )][DBLP]


  27. Efficient service discovery mechanism for wireless sensor networks. [Citation Graph (, )][DBLP]


  28. Detecting DRDoS attacks by a simple response packet confirmation mechanism. [Citation Graph (, )][DBLP]


  29. On time diversity for packet channels. [Citation Graph (, )][DBLP]


  30. A network-assisted mobile VPN for securing users data in UMTS. [Citation Graph (, )][DBLP]


  31. Power-delay trade-off in a many-to-many wireless access. [Citation Graph (, )][DBLP]


  32. Individual profile graphs for location management in PCS networks. [Citation Graph (, )][DBLP]


  33. Design of rate-based controllers for active queue management in TCP/IP networks. [Citation Graph (, )][DBLP]


  34. On model-driven self-engineering of inter-domain traffic. [Citation Graph (, )][DBLP]


  35. Joint uplink/downlink opportunistic scheduling for Wi-Fi WLANs. [Citation Graph (, )][DBLP]


  36. Joint resource conserving and load distributing approaches for routing of survivable connections. [Citation Graph (, )][DBLP]


  37. Neural network-based learning schemes for cognitive radio systems. [Citation Graph (, )][DBLP]


  38. A WEP post-processing algorithm for a Robust 802.11 WLAN implementation. [Citation Graph (, )][DBLP]


  39. Location-free topology control protocol in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  40. TFTP vulnerability finding technique based on fuzzing. [Citation Graph (, )][DBLP]


  41. Fair link striping with FIFO delivery on heterogeneous channels. [Citation Graph (, )][DBLP]


  42. Improving networks using group-based topologies. [Citation Graph (, )][DBLP]


  43. Clustering strategies for improving the lifetime of two-tiered sensor networks. [Citation Graph (, )][DBLP]


  44. The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. [Citation Graph (, )][DBLP]


  45. Fault detection of wireless sensor networks. [Citation Graph (, )][DBLP]


  46. Vertical dimensioning: A novel DRR implementation for efficient fair queueing. [Citation Graph (, )][DBLP]


  47. Pervasive QoS routing in next generation networks. [Citation Graph (, )][DBLP]


  48. The optimum sensor redeployment scheme using the most frangible clusters set. [Citation Graph (, )][DBLP]


  49. Utilization-based prices for elastic services. [Citation Graph (, )][DBLP]


  50. An admission control algorithm for multi-hop 802.11e-based WLANs. [Citation Graph (, )][DBLP]


  51. Mobility-aware topology control in mobile ad hoc networks. [Citation Graph (, )][DBLP]


  52. New routing algorithms in trustworthy Internet. [Citation Graph (, )][DBLP]


  53. A survey on integrating MANETs with the Internet: Challenges and designs. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002