


default search action
7. INC 2008: Plymouth, UK
- Paul Dowland, Steven Furnell:

Seventh International Network Conference (INC 2008), Plymouth, UK, July 8-10, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-188-1
Network Technologies
- Christos Bouras, Apostolos Gkamas, Kostas Stamos:

Monitoring End to End Bandwidth on Demand Circuits over Ethernet Infrastructure. 3-13 - Dan Komosny, Kathiravelu Ganeshan, Mojmir Jelinek, Radim Burget:

Scalability Issues with the Hierarchical Feedback Aggregation for Large-Scale IPTV Systems. 15-26 - Frank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita:

A Framework for Improved QoS Evaluation and Control in SIP-Based NGN. 27-37 - Mahmoud M. Elmesalawy, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim:

Genetic-Based Subcarrier and Bit Allocation Algorithm for Multiuser OFDM System. 39-52 - Mike Morgan, Vic Grout:

Finding Optimal Solutions to Backbone Minimisation Problems using Mixed Integer Programming. 53-63 - Georgios Exarchakos, Nick Antonopoulos, Kan Zhang:

Firewalks: Discovery Mechanism for Non-Replicable Reusable Resources. 65-76 - Armando Roy Delgado, Alexia Robinet, Vic Grout, Rich Picking, John McGinn:

A Survey of Applying Ad Hoc Wireless Sensor Actuator Networks to Enhance Context-Awareness in Environmental Management Systems. 77-90 - Vic Grout, Stuart Cunningham, Rich Hebblewhite:

An Illustrative Discussion of Different Perspectives in Network Engineering. 91-104 - Vic Grout, John N. Davies, John McGinn:

Traffic Modelling and Simulation Techniques for Evaluating ACL Implementation. 105-123 - Nick Antonopoulos, Georgios Exarchakos, Kan Zhang:

Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID Environments. 125-137
Security and Privacy
- Emran Mohd Tamil, Mohd Yamani Idna Bin Idris, Chiew Ming Thong, Madihah Mohd Saudi, Mohd Zalisham Jali:

Needleman Wunsch Implementation for SPAM/UCE Inline Filter. 141-147 - Oleksiy Mazhelis, Hannakaisa Isomäki:

Security Assessment and Planning in Small Organizations. 149-159 - James S. Briggs, Vasilios Katos, Azzri Bhaludin:

On the Security Controls of Portable Computing Devices in Healthcare Environments. 161-170 - Christopher Bolan:

A Review of the Electronic Product Code Standards for RFID Technology. 171-178
Mobile and Wireless Networking
- Ying Dong, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:

Strongly Anonymous Communications in Mobile Ad Hoc Networks. 181-191 - John N. Davies, Vic Grout, Rich Picking:

Prediction of Wireless Network Signal Strength Within a Building. 193-207
Applications and Impacts
- Bartlomiej Polakowski, Krzysztof Amborski:

Ontologies for eLearning. 211-221 - Oliver Schneider, Udo Bleimann, Andrew D. Phippen, Bettina Harriehausen-Mühlbauer:

Inside Coherence: Concept for a Non-Linear eLearning Solution. 223-233 - Michael P. Evans, Shirley Williams, Patrick Parslow, Robert P. Ashton, Karsten Øster Lundqvist, Edwin Porter-Daniels:

The MeAggregator: Personal Aggregation and the Life-Long Tail of the Web. 235-244 - Holger D. Hofmann, Martin Hans Knahl:

The Web 2.0 Demystified – Six Theses on a Misinterpreted Concept. 245-259 - Martin Swientek, Udo Bleimann, Paul Dowland:

Service-Oriented Architecture: Performance Issues and Approaches. 261-269 - Ingo Stengel, Udo Bleimann, Jeanne Stynes:

Optimisation in Multi-Agent Systems. 271-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














