![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computer Communications, Volume 42
Volume 42, April 2014
- Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection in wireless network applications. 1-23
- Konglin Zhu, Wenzhong Li, Xiaoming Fu
:
Rethinking routing information in mobile social networks: Location-based or social-based? 24-37 - Nicolas Drouant, Eric Rondeau, Jean-Philippe Georges
, Francis Lepage:
Designing green network architectures using the ten commandments for a mature ecosystem. 38-46 - Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Andrés Suárez-González
, Manuel Fernández-Veiga
, Cándido López-García
:
Quantitative end-to-end throughput differentiation for bulk TCP applications in the Internet. 47-59 - Samant Saurabh
, Ashok Singh Sairam
:
ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. 60-69 - Nikolaos Pappas
, Anthony Ephremides, Apostolos Traganitis:
Stability and performance issues of a relay assisted multiple access scheme with MPR capabilities. 70-76
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.