default search action
Computer Networks, Volume 104
Volume 104, July 2016
- Vanniyarajan Chellappan, Krishna M. Sivalingam, Kamala Krithivasan:
A Centrality Entropy Maximization Problem in Shortest Path Routing Networks. 1-15 - Yanming Sun, Min Chen, Abel Bacchus, Xiaodong Lin:
Towards collusion-attack-resilient group key management using one-way function tree. 16-26 - Ognjen Joldzic, Zoran Djuric, Pavle V. Vuletic:
A transparent and scalable anomaly-based DoS detection method. 27-42 - Mehmet Karaca, Özgür Erçetin, Tansu Alpcan:
Entropy-based active learning for wireless scheduling with incomplete channel feedback. 43-54 - Yang Wang, Phanvu Chau, Fuyu Chen:
Towards a secured network virtualization. 55-65 - Adel Mounir Sareh Said, Michel Marot, Ashraf William Ibrahim, Hossam Afifi:
Modeling interactive real-time applications in VANETs with performance evaluation. 66-78 - Ashutosh Bhatia, R. C. Hansdah:
TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. 79-93 - Gaofei Huang, Wanqing Tu:
Optimal resource allocation in wireless-powered OFDM relay networks. 94-107 - Nusrat Mehajabin, Md. Abdur Razzaque, Mohammad Mehedi Hassan, Ahmad Almogren, Atif Alamri:
Energy-sustainable relay node deployment in wireless sensor networks. 108-121 - Alysson Bessani, Nuno Ferreira Neves, Paulo Veríssimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia:
JITeR: Just-in-time application-layer routing. 122-136 - Shipra Kumari, Hari Om:
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. 137-154 - Dewei Yi, H. Yang:
HEER - A delay-aware and energy-efficient routing protocol for wireless sensor networks. 155-173 - Mingkui Wei, Wenye Wang:
Data-centric threats and their impacts to real-time communications in smart grid. 174-188 - Deyu Zhang, Zhigang Chen, Haibo Zhou, Long Chen, Xuemin (Sherman) Shen:
Energy-balanced cooperative transmission based on relay selection and power control in energy harvesting wireless sensor network. 189-197 - Faqir Zarrar Yousaf, Christian Wietfeld, Sahibzada Ali Mahmud:
Optimizing tunnel management in predictive handover protocols. 198-212
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.