default search action
International Journal of Autonomous and Adaptive Communications Systems, Volume 2
Volume 2, Number 1, 2009
- Christina Fragouli:
An overview of network coding for dynamically changing networks. 1-23 - Jelena V. Misic, Vojislav B. Misic:
Differential sensing in cognitive personal area networks with bursty secondary traffic and varying primary activity factor. 24-39 - Yang Zhang, Qiang Ni, Hsiao-Hwa Chen:
A new partial transmit sequence scheme using genetic algorithm for peak-to-average power ratio reduction in a multi-carrier code division multiple access wireless system. 40-57 - Michael Hempel, Hamid Sharif, Wei Wang, Ting Zhou, Puttipong Mahasukhon:
A study of critical baseline performance characteristics for IEEE 802.16d. 58-69 - Thomas Kunz:
Energy-efficient routing in mobile ad hoc networks: a cautionary tale. 70-86 - Sunil Kumar, Mahasweta Sarkar, Mehul Nalin Vora:
Dynamic management of quality of service with priority for multimedia multicasting. 87-105
Volume 2, Number 2, 2009
- Anastasia Lygizou, Spyros Xergias, Nikos I. Passas, Lazaros F. Merakos:
A prediction-based scheduling mechanism for interconnection between WiMax and satellite networks. 107-127 - Tarik Aouam, Mohammed Boulmalf, Hamid Harroud:
A quality of service based planning for IEEE802.11g networks. 128-142 - Eduardo Alban, Mario E. Magaña, Thinh Nguyen:
Error propagation mitigation for wireless network coding. 143-163 - Athanasios Voulodimos, Charalampos Z. Patrikakis:
Combining internet collected data to build personalised location based services. 164-174 - Wenchao Jiang, Hai Jin, Yanhong Zhou:
Probing multiple node-disjoint paths using multi-labelled tree traversing. 175-200
Volume 2, Number 3, 2009
- Holger Prothmann, Jürgen Branke, Hartmut Schmeck, Sven Tomforde, Fabian Rochner, Jörg Hähner, Christian Müller-Schloer:
Organic traffic light control for urban road networks. 203-225 - Yingni She, Ho-fung Leung:
Individual agent's wealth in minority games. 226-255 - Daniel Ziener, Jürgen Teich:
Concepts for run-time and error-resilient control flow checking of embedded RISC CPUs. 256-275 - Robert Glaubius, Terry Tidwell, Christopher D. Gill, William D. Smart:
Scheduling policy design for autonomic systems. 276-296 - Martin Gilje Jaatun, Maria B. Line, Tor Olav Grøtan:
Secure remote access to autonomous safety systems: A good practice approach. 297-312
Volume 2, Number 4, 2009
- Fang-Fang Chua:
Adoption of service-oriented architecture by information systems. 317-330 - P. Varalakshmi, S. Thamarai Selvi:
Reputation and policy-based three-tier grid architecture with genuine feedbacks. 331-348 - Christos Chrysoulas, Odysseas G. Koufopavlou:
Proposing a service-enabled semantic grid model. 349-361 - Jianxin Li, Jinpeng Huai, Li Lin:
A negotiation-based trust establishment service for CROWN grid. 362-381 - Yiming Zhang, Rui Chu, Dongsheng Li:
A peer-to-peer IO buffering service based on RAM-grid. 382-396 - Anna K. Lekova:
A methodology for designing of intelligent services in ubiquitous communications. 397-413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.