default search action
Computer Networks [and ISDN Systems], Volume 58
Volume 58, January 2014
- Ian F. Akyildiz, Harry Rudin:
Editorial. 1 - Sangman Cho, Srinivasan Ramasubramanian:
Localizing link failures in all-optical networks using monitoring tours. 2-12 - Robbe Block, Gino T. Peeters, Benny Van Houdt:
A branching process approach to compute the delay and energy efficiency of tree algorithms with free access. 13-28 - Haomin Yang, Yaoxue Zhang, Yuezhi Zhou, Xiaoming Fu, Hao Liu, Athanasios V. Vasilakos:
Provably secure three-party authenticated key agreement protocol using smart cards. 29-38 - Kyoung-Hak Jung, Hyo-Ryun Lee, Wan-Seon Lim, Young-Joo Suh:
An adaptive collision resolution scheme for energy efficient communication in IEEE 802.15.4 networks. 39-57 - Mohammad Faisal Uddin, Chadi Assi, Ali Ghrayeb:
Joint optimal AF relay assignment and power allocation in wireless cooperative networks. 58-69 - Manuel Gil Pérez, Juan E. Tapiador, John A. Clark, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Trustworthy placements: Improving quality and resilience in collaborative attack detection. 70-86 - Wenjie Zhang, Chai Kiat Yeo:
Sequential sensing based spectrum handoff in cognitive radio networks with multiple users. 87-98 - Kuzman Katkalov, Nina Moebius, Kurt Stenzel, Marian Borek, Wolfgang Reif:
Modeling test cases for security protocols with SecureMDD. 99-111 - Lihua Dou, Yunchuan Wei, Jun Ni:
Multi-user wireless channel probing for shared key generation with a fuzzy controller. 112-126 - Xiaofei Wu, Xin Wang, Ke Yu, Frank Y. Li:
A measurement-based study on the correlations of inter-domain Internet application flows. 127-140 - Wei-Min Yao, Sonia Fahmy:
Flow-based partitioning of network testbed experiments. 141-157 - Jin Cheol Kim, Younghee Lee:
An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth. 158-179 - Laura Carrea, Alexei Vernitski, Martin J. Reed:
Optimized hash for network path encoding with minimized false positives. 180-191 - Hars Vardhan, Seong-Ryong Ryu, Bhaskar Banerjee, Ravi Prakash:
60 GHz wireless links in data center networks. 192-205 - Micah Sherr, Harjot Gill, Taher Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
The design and implementation of the A3 application-aware anonymity platform. 206-227 - Hung-Quoc Lai, Yan Chen, K. J. Ray Liu:
Energy efficient cooperative communications using coalition formation games. 228-238 - Ahmed Shawky, Rasmus L. Olsen, Jens Myrup Pedersen, Hans-Peter Schwefel:
Network aware dynamic context subscription management. 239-253 - Mohamed F. Younis, Izzet F. Senturk, Kemal Akkaya, Sookyoung Lee, Fatih Senel:
Topology management techniques for tolerating node failures in wireless sensor networks: A survey. 254-283
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.