The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2009, volume: 32, number: 5


  1. Convertible multi-authenticated encryption scheme with one-way hash function. [Citation Graph (, )][DBLP]


  2. Modified clock-controlled alternating step generators. [Citation Graph (, )][DBLP]


  3. Utility function of TCP. [Citation Graph (, )][DBLP]


  4. Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control. [Citation Graph (, )][DBLP]


  5. Exploiting semantic proximities for content search over p2p networks. [Citation Graph (, )][DBLP]


  6. UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell's load. [Citation Graph (, )][DBLP]


  7. Fast and noniterative scheduling in input-queued switches: Supporting QoS. [Citation Graph (, )][DBLP]


  8. FDF: Frequency detection-based filtering of scanning worms. [Citation Graph (, )][DBLP]


  9. An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks. [Citation Graph (, )][DBLP]


  10. Off-chip communication architectures for high throughput network processors. [Citation Graph (, )][DBLP]


  11. A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks. [Citation Graph (, )][DBLP]


  12. On the properties of an adaptive TCP Minimum RTO. [Citation Graph (, )][DBLP]


  13. Application-driven, energy-efficient communication in wireless sensor networks. [Citation Graph (, )][DBLP]


  14. Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment. [Citation Graph (, )][DBLP]


  15. An investigation of the Internet's IP-layer connectivity. [Citation Graph (, )][DBLP]


  16. Analysis and design of mobile Wireless Social Model. [Citation Graph (, )][DBLP]


  17. Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic. [Citation Graph (, )][DBLP]


  18. Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks. [Citation Graph (, )][DBLP]


  19. Bandwidth allocation in UWB WPANs with ECMA-368 MAC. [Citation Graph (, )][DBLP]


  20. On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols. [Citation Graph (, )][DBLP]


  21. RANC: Relay-aided network coding in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  22. Supporting QoS in IEEE 802.11e wireless LANs over fading channel. [Citation Graph (, )][DBLP]


  23. Transparency analysis and delay compensation scheme for haptic-based networked virtual environments. [Citation Graph (, )][DBLP]


  24. A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks. [Citation Graph (, )][DBLP]


  25. Trustworthy clients: Extending TNC to web-based environments. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002