


default search action
Computer Communications, Volume 42
Volume 42, April 2014
- Robert Mitchell, Ing-Ray Chen:

A survey of intrusion detection in wireless network applications. 1-23
- Konglin Zhu, Wenzhong Li, Xiaoming Fu

:
Rethinking routing information in mobile social networks: Location-based or social-based? 24-37 - Nicolas Drouant, Eric Rondeau, Jean-Philippe Georges

, Francis Lepage:
Designing green network architectures using the ten commandments for a mature ecosystem. 38-46 - Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Andrés Suárez-González

, Manuel Fernández-Veiga
, Cándido López-García
:
Quantitative end-to-end throughput differentiation for bulk TCP applications in the Internet. 47-59 - Samant Saurabh

, Ashok Singh Sairam
:
ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. 60-69 - Nikolaos Pappas

, Anthony Ephremides, Apostolos Traganitis:
Stability and performance issues of a relay assisted multiple access scheme with MPR capabilities. 70-76

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














