default search action
Computer Networks [and ISDN Systems], Volume 81
Volume 81, April 2015
- Xin Jin, Yu-Kwong Kwok:
Coercion builds cooperation in dynamic and heterogeneous P2P live streaming networks. 1-18 - José Marinho, Edmundo Monteiro:
CORHYS: Hybrid signaling for opportunistic distributed cognitive radio. 19-42 - Cristiano G. Rezende, Azzedine Boukerche, Mohammed Almulla, Antonio A. F. Loureiro:
The selective use of redundancy for video streaming over Vehicular Ad Hoc Networks. 43-62 - Ilaria Malanchini, Steven Weber, Matteo Cesana:
Stochastic characterization of the spectrum sharing game in ad-hoc networks. 63-78
- Hamid Farhadi, HyunYong Lee, Akihiro Nakao:
Software-Defined Networking: A survey. 79-95
- Niels Bouten, Ricardo de Oliveira Schmidt, Jeroen Famaey, Steven Latré, Aiko Pras, Filip De Turck:
QoE-driven in-network optimization for Adaptive Video Streaming based on packet sampling measurements. 96-115 - Soochang Park, Seung-Woo Hong, Euisin Lee, Sang-Ha Kim, Noël Crespi:
Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks. 116-135 - Ghadah Aldabbagh, Sheikh Tahir Bakhsh, Nadine Akkari Adra, Sabeen Tahir, Haleh Tabrizi, John M. Cioffi:
QoS-Aware Tethering in a Heterogeneous Wireless Network using LTE and TV White Spaces. 136-146 - Andra Lutu, Marcelo Bagnulo, Cristel Pelsser, Kenjiro Cho, Rade Stanojevic:
An analysis of the economic impact of strategic deaggregation. 147-163 - Zhen Huang, Jinbang Chen, Yisong Lin, Pengfei You, Yuxing Peng:
Minimizing data redundancy for high reliable cloud storage systems. 164-177 - Hakan Kardes, Mehmet Hadi Gunes, Kamil Saraç:
Graph Based Induction of unresponsive routers in Internet topologies. 178-200 - Annalisa Socievole, Eiko Yoneki, Floriano De Rango, Jon Crowcroft:
ML-SOR: Message routing using multi-layer social networks in opportunistic communications. 201-219 - Christos Anagnostopoulos, Stathes Hadjiefthymiades, Kostas Kolomvatsos:
Time-optimized user grouping in Location Based Services. 220-244 - Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang:
A delegation based cross trusted domain direct anonymous attestation scheme. 245-257 - Siddhartha Sarma, Joy Kuri:
Optimal power allocation for protective jamming in wireless networks: A flow based model. 258-271 - Andrea Detti, Bruno Ricci, Nicola Blefari-Melazzi:
Mobile peer-to-peer video streaming over information-centric networks. 272-288 - Wei Yin, Peizhao Hu, Jadwiga Indulska:
Rate control in the mac80211 framework: Overview, evaluation and improvements. 289-307 - Bing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou:
DDoS attack protection in the era of cloud computing and Software-Defined Networking. 308-319 - Tobias Hoßfeld, Michael Seufert, Christian Sieber, Thomas Zinner, Phuoc Tran-Gia:
Identifying QoE optimal adaptation of HTTP adaptive streaming based on subjective studies. 320-332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.