Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Réseau de recouvrement")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 205

  • Page / 9
Export

Selection :

  • and

Field trials of 100G and beyond: an operator's point of viewVORBECK, S; SCHNEIDERS, M; FRITZSCHE, D et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 7959, issn 0277-786X, isbn 978-0-8194-8496-3, 1Vol, 79590B.1-79590B.7Conference Paper

An Incrementally Deployable Flow-Based Scheme for IP TracebackHONGCHENG TIAN; JUN BI.IEEE communications letters. 2012, Vol 16, Num 7, pp 1140-1143, issn 1089-7798, 4 p.Article

NETWORK VIRTUALISATION: CONCEPTS AND PERFORMANCE ASPECTSTUTSCHKU, Kurt; MÜLLER, Paul; DANG TRAN, Frédéric et al.International journal of communication networks and distributed systems (Print). 2011, Vol 6, Num 3, issn 1754-3916, 114 p.Serial Issue

New Security Layer for OverLay NetworksIMAI, Hideki; SHIN, Seonghan; KOBARA, Kazukuni et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 3, pp 211-228, issn 1229-2370, 18 p.Article

Scalable merger of chord-ringsLAJOS KIS, Zoltán; SZABO, Róbert.International journal of communication networks and distributed systems (Print). 2010, Vol 4, Num 4, pp 376-388, issn 1754-3916, 13 p.Article

A Geographic Location-Based Distributed Routing SystemKOBAYASHI, Kumiko; GUSTI BAGUS BASKARA NUGRAHA, I; MORITA, Hiroyoshi et al.IEICE transactions on communications. 2013, Vol 96, Num 1, pp 88-98, issn 0916-8516, 11 p.Article

Network Virtualization as Foundation for Enabling New Network Architectures and Applications : New Generation Network towards Innovative Future SocietyNAKAO, Akihiro.IEICE transactions on communications. 2010, Vol 93, Num 3, pp 454-457, issn 0916-8516, 4 p.Article

Dynamic overlay routing based on active probing measurements: An emulation studyXINXIN ZHANG; WEI YE; YAOHUI JIN et al.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7633, issn 0277-786X, isbn 978-0-8194-8035-4 0-8194-8035-5, 1Vol, 76330Y.1-76330Y.7Conference Paper

A distributed routing for wireless sensor networks with mobile sink based on the greedy embeddingYISONG JIANG; WEIREN SHI; XIAOGANG WANG et al.Ad hoc networks. 2014, Vol 20, pp 150-162, issn 1570-8705, 13 p.Article

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNsXIXIANG LV; YI MU; HUI LI et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 5-13, issn 1556-6013, 9 p.Article

Performance Analysis and Improvement Content Discovery Protocols Over Vehicular NetworksROMOOZI, Morteza; FATHY, Mahmood; BERANGI, Reza et al.Wireless personal communications. 2014, Vol 75, Num 2, pp 857-899, issn 0929-6212, 43 p.Article

Overlay live video streaming with heterogeneous bitrate requirementsDONGNI REN; WANG KIT WONG; CHAN, S.-H. Gary et al.Computer networks (1999). 2014, Vol 74, pp 53-63, issn 1389-1286, 11 p., aArticle

TDCS-Based Cognitive Radio Networks with Multiuser Interference AvoidanceSU HU; GUOAN BI; YONG LIANG GUAN et al.IEEE transactions on communications. 2013, Vol 61, Num 12, pp 4828-4835, issn 0090-6778, 8 p.Article

Got Loss? Get zOVN!CRISAN, Daniel; BIRKE, Robert; CRESSIER, Gilles et al.Computer communication review. 2013, Vol 43, Num 4, pp 423-434, issn 0146-4833, 12 p.Conference Paper

Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay―Overlay Cognitive Radio NetworksSENTHURAN, S; ANPALAGAN, A; DAS, O et al.IEEE transactions on wireless communications. 2012, Vol 11, Num 6, pp 2024-2035, issn 1536-1276, 12 p.Article

A collaborative botnets suppression system based on overlay networkFUYE HAN; ZHEN CHEN; HONGFENG XU et al.International journal of security and networks (Print). 2012, Vol 7, Num 4, pp 211-219, issn 1747-8405, 9 p.Article

An overlay network for autonomous information discovery in the post-composition registries of ambient networksBELQASMI, Fatna; GLITHO, Roch; DSSOULI, Rachida et al.Journal of network and computer applications. 2011, Vol 34, Num 2, pp 697-707, issn 1084-8045, 11 p.Article

Performance analysis of the CAC scheme CARETON under mixed cell environment in overlay networks : ADVANCES IN WIRELESS, MOBILE AND P2P-BASED INTERNET PROTOCOLS. APPLICATIONS AND ARCHITECTURESMUKHOPADHYAY, Asish K; KHARA, Sibaram; SAHA, Sajal et al.International journal of Internet protocol technology (Print). 2011, Vol 6, Num 1-2, pp 65-74, issn 1743-8209, 10 p.Article

Random Network Coding in Peer-to-Peer Networks: From Theory to Practice : NETWORK CODINGBAOCHUN LI; DI NIU.Proceedings of the IEEE. 2011, Vol 99, Num 3, pp 513-523, issn 0018-9219, 11 p.Article

Randomized load balancing strategies with churn resilience in peer-to-peer networksSONG FU; XU, Cheng-Zhong; HAIYING SHEN et al.Journal of network and computer applications. 2011, Vol 34, Num 1, pp 252-261, issn 1084-8045, 10 p.Article

SigProbe: An Efficient End-to-End Bandwidth Measurement Technique Utilizing the Path Signatures and Graphical AnalysesJIN CHEOL KIM; LEE, Younghee.IEICE transactions on communications. 2011, Vol 94, Num 4, pp 1076-1080, issn 0916-8516, 5 p.Article

Virtual Overlay Network SchedulingFENG GU; CHONGYANG XIE; MIN PENG et al.IEEE communications letters. 2011, Vol 15, Num 8, pp 893-895, issn 1089-7798, 3 p.Article

On predictable large-scale data delivery in prefix-based virtualized content networksWÄHLISCH, Matthias; SCHMIDT, Thomas C; WITTENBURG, Georg et al.Computer networks (1999). 2011, Vol 55, Num 18, pp 4086-4100, issn 1389-1286, 15 p.Article

Analysis of an anycast based overlay system for scalable service discovery and executionSTEVENS, Tim; WAUTERS, Tim; DEVELDER, Chris et al.Computer networks (1999). 2010, Vol 54, Num 1, pp 97-111, issn 1389-1286, 15 p.Article

Inter-domain policy violations in multi-hop overlay routes : Analysis and mitigationSEETHARAMAN, Srinivasan; AMMAR, Mostafa.Computer networks (1999). 2009, Vol 53, Num 1, pp 60-80, issn 1389-1286, 21 p.Article

  • Page / 9