The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2006, volume: 29, number: 3

  1. Brian Neil Levine, Clay Shields
    Internet security. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:279- [Journal]
  2. John W. Byers, Jeffrey Considine, Gene Itkis, Mei Chin Cheng, Alex Yeung
    Securing bulk content almost for free. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:280-290 [Journal]
  3. T. Perlines Hormann, Konrad Wrona, S. Holtmanns
    Evaluation of certificate validation mechanisms. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:291-305 [Journal]
  4. Dogan Kesdogan, Charles Palmer
    Technical challenges of network anonymity. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:306-324 [Journal]
  5. Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos
    Secure distributed intelligent networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:325-336 [Journal]
  6. Dario Di Sorte, Mauro Femminella, Leonardo Piacentini, Gianluca Reali
    Target access router selection in advanced mobility scenarios. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:337-357 [Journal]
  7. Shiann-Tsong Sheu, Yun-Yen Shih, Yue-Ru Chuang
    An ACK-based polling strategy for supporting high performance and QoS in IEEE 802.11 wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:358-371 [Journal]
  8. Athanasios Drigas, S. Kouremenos, Y. Bakopoulos, Vassilis Loumos
    A study of H.263 traffic modeling in multipoint videoconference sessions over IP networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:372-391 [Journal]
  9. Gang Cheng, Nirwan Ansari
    Finding a least hop(s) path subject to multiple additive constraints. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:392-401 [Journal]
  10. Ajay Pal Singh Virk, Raouf Boutaba
    Economical protection in MPLS networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:402-408 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002