The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2006, volume: 29, number: 2

  1. Mohamed Eltoweissy, Mohamed F. Younis
    Dependable Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:149-150 [Journal]
  2. Karim Seada, Ahmed Helmy
    Efficient and robust geocasting protocols for sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:151-161 [Journal]
  3. Yong Yuan, Zongkai Yang, Zhihai He, Jianhua He
    An integrated energy aware wireless transmission system for QoS provisioning in wireless sensor network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:162-172 [Journal]
  4. Ertan Onur, Cem Ersoy, Hakan Deliç
    How many sensors for an acceptable breach detection probability? [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:173-182 [Journal]
  5. Sandeep S. Kulkarni, Mahesh Arumugam
    Transformations for write-all-with-collision model, . [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:183-199 [Journal]
  6. Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
    Secret instantiation in ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:200-215 [Journal]
  7. Jing Deng, Richard Han, Shivakant Mishra
    INSENS: Intrusion-tolerant routing for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:216-230 [Journal]
  8. Min Chen, Taekyoung Kwon, Yanghee Choi
    Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:231-245 [Journal]
  9. Michael G. Hinchey, James L. Rash, Christopher Rouff, Denis Gracanin
    Achieving dependability in sensor networks through automated requirements-based programming. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:246-256 [Journal]
  10. Yu-Wei Chen, Yi-Ta Lee
    A broadcasting scheme with supporting VCR functions for near video-on-demand systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:257-267 [Journal]
  11. Lotfi Benachenhou, Samuel Pierre
    Protection of a mobile agent with a reference clone. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:268-278 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002