Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Business Data Communications and Networking, Volume 2
Volume 2, Number 1, 2006
- Tuan Loc Nguyen, Abbas Jamalipour, Francine Krief, Guy Pujolle:
NetApp: Autonomic Network-Based Application Architecture for Creating New Value-Added Services. 1-14 - Hak Ju Kim:
The Economic Value of Modularity in the IPQoS Network: The Real Options Approach (ROA). 15-31 - Maode Ma, Zheng Xiang:
Supporting Real-Time Service in Packet-Switched Wireless Networks. 32-43 - Yun Wang, Lee Seidman:
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior. 44-60
Volume 2, Number 2, 2006
- David G. Schwartz, Zac Sadan:
Strip-Mining the Web with SAIM: A System for the Analysis of Instant Messaging. 1-20 - Ahmed Gad Abdel-Wahab:
Employees' Attitudes Toward Telecommuting: An Empirical Investigation in the Egyptian Governornate of Dakahlia. 21-36 - Abid Al-Ajeeli, Yousif Al-Bastaki:
Designing a Resilient and High Performance Network. 37-54 - Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano:
Multicast Copyright Protection System Based on a Trusted Soft-Engine. 55-67
Volume 2, Number 3, 2006
- Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Shamala Subramaniam:
Fuzzy Reasoning Approach for Local Connectivity Management in Mobile Ad Hoc Networks. 1-18 - K. S. Shaji Britto, P. E. Sankaranarayanan:
Multiple Casting in a Wired LAN Using CDMA Technique. 19-30 - Yun Wang, Sharon-Lise T. Normand:
Determining the Minimum Sample Size of Audit Data Required to Profile User Behavior and Detect Anomaly Intrusion. 31-45 - M. Chandrasekaran, R. S. D. Wahida Banu:
Interaction Between MIMD-Poly and PIPD-Poly Algorithms and Other TCP Variants in Multiple Bottleneck TCP Networks. 46-64
Volume 2, Number 4, 2006
- Rania Wehbi, Ayman I. Kayssi, Ali Chehab, Zaher Dawy:
Network Setup for Secure Routing in Inter-Vehicle Communication Networks. 1-17 - Abdoul-Kader Harouna Souley, Soumaya Cherkaoui:
Simulating Realistic Urban Scenarios for Ad Hoc Networks. 18-33 - Raed M. Shubair, Khalid Al Midfa, A. Al-Marri, M. Al-Nuaimi:
Robust Algorithms for DOA Estimation and Adaptive Beamforming in Wireless Mobile Communications. 34-45 - Ghassan Kbar, Wathiq Mansoor:
Distributed Resources Management in Wireless LANs. 46-58 - Nurul I. Sarkar, Catherine Byrne, Nabeel A. Y. Al-Qirim:
Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization. 59-77
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.