The SCEAS System
Navigation Menu

Journals in DBLP

Computer Networks
2005, volume: 48, number: 2

  1. Shengli Yuan, Jason P. Jue
    Dynamic lightpath protection in WDM mesh networks under wavelength-continuity and risk-disjoint constraints. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:91-112 [Journal]
  2. Anirban Mahanti, Derek L. Eager, Mary K. Vernon
    Improving multirate congestion control using a TCP Vegas throughput model. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:113-136 [Journal]
  3. Zhi Quan, Jong-Moon Chung
    Statistical admission control for real-time services under earliest deadline first scheduling. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:137-154 [Journal]
  4. Swati Sinha Deb, Michael E. Woodward
    A new distributed QoS routing algorithm based on Fano's method. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:155-174 [Journal]
  5. Dan Pei, Matt Azuma, Daniel Massey, Lixia Zhang
    BGP-RCN: improving BGP convergence through root cause notification. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:175-194 [Journal]
  6. Kamil Saraç, Kevin C. Almeroth
    Application layer reachability monitoring for IP multicast. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:195-213 [Journal]
  7. Junfeng Wang, Lei Li, Fuchun Sun, Mingtian Zhou
    A probability-guaranteed adaptive timeout algorithm for high-speed network flow detection. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:215-233 [Journal]
  8. Dimitris Gavrilis, Evangelos Dermatas
    Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:235-245 [Journal]
  9. Emmanuel Bayse, Ana R. Cavalli, Manuel Núñez, Fatiha Zaïdi
    A passive testing approach based on invariants: application to the WAP [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:235-245 [Journal]
  10. Wei Liang, Wenye Wang
    On performance analysis of challenge/response based authentication in wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:2, pp:267-288 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002