Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2.1 - Network Architecture and Design

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
page 896 - 920
Vol.22 / Issue 12
C. Aguirre, R. Huerta, L. Tsimring:
Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms
page 2747 - 2764
Vol.15 / Issue 14
Ł. Apiecionek, M. Biedziak:
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
page 1435 - 20
Vol.26 / Issue 11
Ł. Apiecionek, M. Großmann, U.R. Krieger:
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
page 571 - 590
Vol.25 / Issue 6
C. Baladrón, A. Cadenas, J. Aguiar, B. Carro, A. Sánchez-Esguevillas:
Multi-Level Context Management and Inference Framework for Smart Telecommunication Services
page 1973 - 1991
Vol.16 / Issue 15
G. Blinowski, K. Szczypiorski:
Steganography in VLC Systems
page 454 - 478
Vol.23 / Issue 5
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
page 4 - 31
Vol.13 / Issue 1
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
Impact of Resource Control in Irregular Networks on their Transmission Properties
page 591 - 610
Vol.25 / Issue 6
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs
page 528 - 546
Vol.26 / Issue 4
L. Campanile, M. Iacono, F. Marulli, M. Mastroianni, N. Mazzocca:
Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices
page 1455 - 1474
Vol.26 / Issue 11
G. Cattaneo, G. De Maio, U. Ferraro Petrillo:
Security Issues and Attacks on the GSM Standard: a Review
page 2437 - 2452
Vol.19 / Issue 16
T. Forzi, M. Peters:
A Methodology and a Toolkit that Integrate Technological, Organisational, and Human Factors to Design KM within Knowledge-Intensive Networks
page 495 - 525
Vol.11 / Issue 4
L. Fuentes, N. Gámez:
Configuration Process of a Software Product Line for AmI Middleware
page 1592 - 1611
Vol.16 / Issue 12
A.E. Garcia, K.D. Hackbarth:
Approximation to a Behavioral Model for Estimating Traffic Aggregation Scenarios
page 731 - 744
Vol.14 / Issue 5
U. Glaesser, R. Karges:
Abstract State Machine Semantics of SDL
page 1382 - 1414
Vol.3 / Issue 12
S. Lee, H. Kim, C. Kim:
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
page 1105 - 1117
Vol.14 / Issue 7
V. Leppaenen:
On Implementing EREW Work-Optimally on Mesh of Trees
page 23 - 34
Vol.1 / Issue 1
Q. Liu, M. Chen, J. Zhang, B. Shen, Z. Chu:
Network Planning for WiMAX-R Networks
page 1194 - 1217
Vol.18 / Issue 9
J. Luo, W. Wu, M. Yang:
Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks
page 2064 - 2083
Vol.17 / Issue 14
P. Martinez-Julia, A.F. Gómez-Skarmeta:
A Novel Identity-based Network Architecture for Next Generation Internet
page 1643 - 1661
Vol.18 / Issue 12
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
page 857 - 873
Vol.18 / Issue 6
H. Mousannif, I. Khalil, H. Al Moatassime:
Cooperation as a Service in VANETs
page 1202 - 1218
Vol.17 / Issue 8
R. Mueller-Bady, M. Kappes, I. Medina-Bulo, F. Palomo-Lozano:
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures
page 788 - 815
Vol.25 / Issue 7
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
page 56 - 86
Vol.13 / Issue 1
S. Pal:
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues
page 1594 - 1634
Vol.21 / Issue 12
S. Prabavathy, K. Sundarakantham, S. Shalinie:
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure
page 577 - 602
Vol.24 / Issue 5
L. Rodríguez de Lope, K.D. Hackbarth:
Cost Model for Bitstream Access Services with QoS Parameters
page 653 - 672
Vol.14 / Issue 5
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
page 3299 - 3313
Vol.16 / Issue 21
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
page 1605 - 1622
Vol.17 / Issue 11
P.I. Shah, P.A. Shah, S. Yasmin, Z. ur-Rehman, A. Ahmad, Y. Nam, S. Rho:
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
page 1282 - 1305
Vol.24 / Issue 9
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
page 1343 - 1367
Vol.16 / Issue 10
W. Stańczuk, J. Lubacz, E. Toczyłowski:
Trading Links and Paths on a Communication Bandwidth Market
page 642 - 653
Vol.14 / Issue 5
D. Vega, R. Meseguer, F. Freitag, S.F. Ochoa:
Understanding Collaboration in Volunteer Computing Systems
page 1738 - 1765
Vol.20 / Issue 13
M. Yang, B. Liu, W. Wang, J. Luo, X. Shen:
Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks
page 1855 - 1874
Vol.20 / Issue 13

Zeadally Sherali