|
Journals in DBLP
- Luigi Atzori, Nicola Aste, Mauro Isola
Estimation of multifractal parameters in traffic measurement: An accuracy-based real-time approach. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1879-1888 [Journal]
- Yunqiang Liu, Songyu Yu, Jun Zhou
Adaptive segment-based patching scheme for video streaming delivery system. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1889-1895 [Journal]
- Jianping Wang, Xiangtong Qi, Mei Yang
Routing and wavelength assignment for core-based tree in WDM networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1896-1904 [Journal]
- Chao Gong, Kamil Saraç, Ovidiu Daescu, Balaji Raghavachari, Raja Jothi
Load-balanced agent activation for value-added network services. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1905-1916 [Journal]
- Junhua Tang, Liren Zhang, Chee Kheong Siew
An opportunistic video scheduling algorithm over shared wireless downlink. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1917-1926 [Journal]
- Hyesook Lim, Wonjung Kim, Bomi Lee, Changhoon Yim
High-speed IP address lookup using balanced multi-way trees. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1927-1935 [Journal]
- Hui Tian, Hong Shen
Multicast-based inference for topology and network-internal loss performance from end-to-end measurements. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1936-1947 [Journal]
- Ben-Jye Chang, Pei-Shang Chang
Multicode-based WCDMA for reducing waste rate and reassignments in mobile cellular communications. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1948-1958 [Journal]
- Sung-eok Jeon
Topology aggregation: Merged-star method for multiple non-isomorphic topology subgraphs. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1959-1962 [Journal]
- Mohammad Haeri, Amir Hamed Mohsenian Rad
Adaptive model predictive TCP delay-based congestion control. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1963-1978 [Journal]
- Yeonghwan Tscha, Mehmet Ufuk Çaglayan
Query slipping prevention for trajectory-based publishing and subscribing in wireless sensor networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1979-1991 [Journal]
- Aurelio La Corte, Sabrina Sicari
Assessed quality of service and voice and data integration: A case study. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:1992-2003 [Journal]
- Anirban Chakrabarti, G. Manimaran
A case for tree evolution in QoS multicasting. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2004-2025 [Journal]
- ShuTang Yang, Bingpeng Ma
Study on the extensibility of video conferencing with speech mixing. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2026-2033 [Journal]
- Stefano Salsano, Alessio Botta, Paola Iovanna, Marco Intermite, Andrea Polidoro
Traffic engineering with OSPF-TE and RSVP-TE: Flooding reduction techniques and evaluation of processing cost. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2034-2045 [Journal]
- Mojtaba Hosseini, Nicolas D. Georganas
End System Multicast routing for multi-party videoconferencing applications. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2046-2065 [Journal]
- Hao Liu, Wenjun Zhang, Xiaokang Yang
Cross-layer conditional retransmission for layered video streaming over cellular networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2066-2073 [Journal]
- Shaobin Cai, Nianmin Yao, Nianbin Wang, Wenbin Yao, Guochang Gu
Multipath passive data acknowledgement on-demand multicast protocol. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2074-2083 [Journal]
- Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
An adaptive bluetooth packet selection and scheduling scheme in interference environments. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2084-2095 [Journal]
- Athanasios Vaios, Konstantinos Oikonomou, Ioannis Stavrakakis
Analysis of a topology control paradigm in WLAN/WPAN environments. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2096-2108 [Journal]
- Dimitris Fotakis, Stefanos Gritzalis
Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2109-2122 [Journal]
- Xiaofeng Bai, Abdallah Shami, Chadi Assi
On the fairness of dynamic bandwidth allocation schemes in Ethernet passive optical networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2123-2135 [Journal]
- Dandan Liu, Xiaodong Hu, Xiaohua Jia
Energy efficient information dissemination protocols by negotiation for wireless sensor networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2136-2149 [Journal]
- Dong-Her Shih, Po-Ling Sun, David C. Yen, Shi-Ming Huang
Taxonomy and survey of RFID anti-collision protocols. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2150-2166 [Journal]
- Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2167- [Journal]
- Mohammed Hadi Habaebi, I. Vivaldi, B. M. Ali, V. Prakash
Erratum to "Macro/micro-mobility fast handover in hierarchical mobile IPv6" [Computer Communications, 29 (2006) 611-617]. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2168- [Journal]
|