Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2 - COMPUTER-COMMUNICATION NETWORKS

M.A. Abdelouahab, A. Bouabdallah, M. Achemlal, S. Laniepce:
The Topology Change Attack: Threat and Impact
/jucs_15_2/the_topology_change_attack
page 465 - 487
Vol.15 / Issue 2
D. Beneventano, S. Bergamaschi, F. Guerra, M. Vincini:
The SEWASIE Network of Mediator Agents for Semantic Search
/jucs_13_12/the_sewasie_network_of
page 1936 - 1969
Vol.13 / Issue 12
G. Cattaneo, G. De Maio, U. Ferraro Petrillo:
Security Issues and Attacks on the GSM Standard: a Review
/jucs_19_16/security_issues_and_attacks
page 2437 - 2452
Vol.19 / Issue 16
S. Hadjiefthymiades, L. Merakos:
A Survey of Web Architectures for Wireless Communication Environments
/jucs_5_7/a_survey_of_web
page 390 - 417
Vol.5 / Issue 7
C.-J. Huang, I.-F. Chen, K.-W. Hu, H.-Y. Shen, Y.-J. Chen, D.-X. Yang:
A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks
/jucs_15_13/a_load_balancing_and
page 2506 - 2527
Vol.15 / Issue 13
M. Hwang, D. Choi, P. Kim:
Least Slack Time Rate first: an Efficient Scheduling Algorithm for Pervasive Computing Environment
/jucs_17_6/least_slack_time_rate
page 912 - 925
Vol.17 / Issue 6
A.J. Jara, D. Fernandez, P. Lopez, M.A. Zamora, A.F. Skarmeta, L. Marin:
Evaluation of Bluetooth Low Energy Capabilities for Tele-mobile Monitoring in Home-care
/jucs_19_9/evaluation_of_bluetooth_low
page 1219 - 1241
Vol.19 / Issue 9
N. Labraoui, M. Gueroui, M. Aliouat, J. Petit:
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
/jucs_17_11/rahim_robust_adaptive_approach
page 1550 - 1571
Vol.17 / Issue 11
V. Leppänen:
Balanced PRAM Simulations via Moving Threads and Hashing
/jucs_4_8/balanced_pram_simulations_via
page 675 - 689
Vol.4 / Issue 8
Y. Liu, D. Ginther, P. Zelhart:
How Do Frequency and Duration of Messaging Affect Impression Development in Computer-Mediated Communication?
/jucs_7_10/how_do_frequency_and
page 893 - 914
Vol.7 / Issue 10
M. Naldi, G. D'Acquisto:
A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks
/jucs_14_5/a_normal_copula_model
page 786 - 799
Vol.14 / Issue 5
P.M. Papazoglou, D.A. Karras, R.C. Papademetriou:
An Improved Multi-Agent Simulation Methodology for Modelling and Evaluating Wireless Communication Systems Resource Allocation Algorithms
/jucs_14_7/an_improved_multi_agent
page 1061 - 1069
Vol.14 / Issue 7
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
/jucs_16_21/impact_of_cpu_bound
page 3299 - 3313
Vol.16 / Issue 21
B. Shen, J. Guo:
Efficient Peer-to-Peer Content Sharing for Learning in Virtual Worlds
/jucs_25_5/efficient_peer_to_peer
page 465 - 488
Vol.25 / Issue 5
I. Tomek:
Knowledge Management and Collaborative Virtual Environments
/jucs_7_6/knowledge_management_and_collaborative
page 458 - 471
Vol.7 / Issue 6