|
Journals in DBLP
- Ian F. Akyildiz, Harry Rudin
Editorial. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:75-76 [Journal]
- Ligang Wang, Anjali Agarwal, J. William Atwood
Modelling and verification of interworking between SIP and H.323. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:77-98 [Journal]
- Liza Lai-Yee Shek, Yu-Kwong Kwok
An integrated approach to scatternet traffic management in Bluetooth ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:99-118 [Journal]
- Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P. Agrawal
Reducing power consumption and enhancing performance by direct slave-to-slave and group communication in Bluetooth WPANs. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:119-141 [Journal]
- Chang N. Zhang, Chunren Lai
A systematic approach for encryption and authentication with fault tolerance. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:143-154 [Journal]
- Amotz Bar-Noy, Vladimir Dreizin, Boaz Patt-Shamir
Efficient algorithms for periodic scheduling. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:155-173 [Journal]
- Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
Measuring normality in HTTP traffic for anomaly-based intrusion detection. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:175-193 [Journal]
- Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis
Security applications of peer-to-peer networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:195-205 [Journal]
- Laura Galluccio, Alessandro Leonardi, Giacomo Morabito
Tuning transmission power for TCP fairness in next generation wireless networks: an analytical paradigm. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:207-219 [Journal]
- Harsha V. Madhyastha, C. Siva Ram Murthy
Efficient dynamic traffic grooming in service-differentiated WDM mesh networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2004, v:45, n:2, pp:221-235 [Journal]
|