Pascal and Francis Bibliographic Databases

Help

Search results

Your search

cc.\*:("001D04B03F")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1524

  • Page / 61
Export

Selection :

  • and

Flash-Aware Page Management Policy of a Navigation-Specialized Mobile DBMS for an Incremental Map UpdateMIN, Kyoungwook; CHOI, Jeongdan.IEICE transactions on information and systems. 2013, Vol 96, Num 5, pp 1211-1214, issn 0916-8532, 4 p.Article

Network-Assisted Mobile Computing with Optimal Uplink Query ProcessingCHAN, Carri W; BAMBOS, Nicholas; SINGH, Jatinder Pal et al.IEEE transactions on mobile computing. 2013, Vol 12, Num 4-6, issn 1536-1233, p. 1065Article

Predicting Human Movement Based on Telecom's Handoff in Mobile NetworksLIN, Yi-Bing; HUANG-FU, Chien-Chun; ALRAJEH, Nabil et al.IEEE transactions on mobile computing. 2013, Vol 12, Num 4-6, issn 1536-1233, p. 1236Article

Movement-aware and QoS-driven indoor location and mobile service discovery frameworkMOHAMED ADEL SERHANI; EL-HAJJ, Wassim.International journal of wireless and mobile computing (Print). 2013, Vol 6, Num 5, pp 481-500, issn 1741-1084, 20 p.Article

Privacy analysis in mobile social networks: the influential factors for disclosure of personal dataSAPUPPO, Antonio.International journal of wireless and mobile computing (Print). 2012, Vol 5, Num 4, pp 315-326, issn 1741-1084, 12 p.Article

Personalise your massively multiplayer online game (MMOG) with ArtemisDAYLAMANI ZAD, Damon; ANGELIDES, Marios C; AGIUS, Harry et al.Multimedia systems. 2012, Vol 18, Num 1, pp 69-94, issn 0942-4962, 26 p.Article

A Policy-Based Trust-Aware Adaptive Monitoring Scheme to enhance WiMax QoSSAFA, Haidar; ABU SHAHLA, Farah.Computer networks (1999). 2011, Vol 55, Num 10, pp 2465-2480, issn 1389-1286, 16 p.Article

A combined resource management and admission control scheme for optimizing uplink performance of M-WiMAX systemsTHEODORIDIS, Georgios; PAVLIDOU, Fotini-Niovi.Computer networks (1999). 2011, Vol 55, Num 17, pp 3975-3986, issn 1389-1286, 12 p.Article

A design for securing data delivery in mesh-based peer-to-peer streamingSEIBERT, Jeff; XIN SUN; NITA-ROTARU, Cristina et al.Computer networks (1999). 2011, Vol 55, Num 12, pp 2730-2745, issn 1389-1286, 16 p.Article

A framework for risk assessment based on analysis of historical information of workflow execution in IT systemsARAUJO WICKBOLDT, Juliano; BLANCHIN, Luis Armando; CASTAGNA LUNARDI, Roben et al.Computer networks (1999). 2011, Vol 55, Num 13, pp 2954-2975, issn 1389-1286, 22 p.Article

A game theoretic analysis of network design with socially-aware usersELIAS, Jocelyne; MARTIGNON, Fabio; AVRACHENKOV, Konstantin et al.Computer networks (1999). 2011, Vol 55, Num 1, pp 106-118, issn 1389-1286, 13 p.Article

A lightweight group-key management protocol for secure ad-hoc-network routingCASTRO FERNANDES, Natalia; BANDEIRA DUARTE, Otto Carlos Muniz.Computer networks (1999). 2011, Vol 55, Num 3, pp 759-778, issn 1389-1286, 20 p.Article

Accurate network anomaly classification with generalized entropy metricsTELLENBACH, Bernhard; BURKHART, Martin; SCHATZMANN, Dominik et al.Computer networks (1999). 2011, Vol 55, Num 15, pp 3485-3502, issn 1389-1286, 18 p.Article

An effective mesh-pull-based P2P video streaming system using Fountain codes with variable symbol sizesHYUNG RAI OH; OLIVER WU, Dapeng; HWANGJUN SONG et al.Computer networks (1999). 2011, Vol 55, Num 12, pp 2746-2759, issn 1389-1286, 14 p.Article

Asymmetric group key agreement protocol for open networks and its application to broadcast encryptionLEI ZHANG; QIANHONG WU; BO QIN et al.Computer networks (1999). 2011, Vol 55, Num 15, pp 3246-3255, issn 1389-1286, 10 p.Article

Balancing message delivery latency and network lifetime through an integrated model for clustering and routing in Wireless Sensor NetworksMORO AIOFFI, Wagner; ARBEX VALLE, Cristiano; MATEUS, Geraldo R et al.Computer networks (1999). 2011, Vol 55, Num 13, pp 2803-2820, issn 1389-1286, 18 p.Article

BiCo: Network operator-friendly P2P traffic control through bilateral cooperation with peersLEE, Hyunyong; NAKAO, Akihiro; KIM, Jongwon et al.Computer networks (1999). 2011, Vol 55, Num 9, pp 2023-2034, issn 1389-1286, 12 p.Article

CR-Chord: Improving lookup availability in the presence of malicious DHT nodesNECHAEV, B; KORZUN, D; GURTOV, A et al.Computer networks (1999). 2011, Vol 55, Num 13, pp 2914-2928, issn 1389-1286, 15 p.Article

Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?ALSHAMMARI, Riyad; NUR ZINCIR-HEYWOOD, A.Computer networks (1999). 2011, Vol 55, Num 6, pp 1326-1350, issn 1389-1286, 25 p.Article

Characterization of BitTorrent swarms and their distribution in the InternetHOSSFELD, Tobias; LEHRIEDER, Frank; HOCK, David et al.Computer networks (1999). 2011, Vol 55, Num 5, pp 1197-1215, issn 1389-1286, 19 p.Article

Collusion in peer-to-peer systemsCICCARELLI, Gianluca; LO CIGNO, Renato.Computer networks (1999). 2011, Vol 55, Num 15, pp 3517-3532, issn 1389-1286, 16 p.Article

Cost-efficient design for higher capacity hybrid wireless-optical broadband access network (WOBAN)REAZ, Abu; RAMAMURTHI, Vishwanath; TORNATORE, Massimo et al.Computer networks (1999). 2011, Vol 55, Num 9, pp 2138-2149, issn 1389-1286, 12 p.Article

Cross-layer failure restoration of IP multicast with applications to IPTVYUKSEL, M; RAMAKRISHNAN, K. K; DOVERSPIKE, R. D et al.Computer networks (1999). 2011, Vol 55, Num 9, pp 2329-2351, issn 1389-1286, 23 p.Article

Discriminant Minimization Search for Large-Scale RF-Based Localization SystemsKUO, Sheng-Po; TSENG, Yu-Chee.IEEE transactions on mobile computing. 2011, Vol 10, Num 2, pp 291-304, issn 1536-1233, 14 p.Article

Discriminating graphs through spectral projectionsFAY, Damien; HADDADI, Hamed; UHLIG, Steve et al.Computer networks (1999). 2011, Vol 55, Num 15, pp 3458-3468, issn 1389-1286, 11 p.Article

  • Page / 61