Search

Showing total 357 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic computer networks Remove constraint Topic: computer networks Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publisher oxford university press / usa Remove constraint Publisher: oxford university press / usa
357 results

Search Results

1. Communication costs in science: evidence from the National Science Foundation Network.

2. Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks.

3. Link Residual Closeness of Graphs with Fixed Parameters.

4. CFAuditChain: Audit BlockChain Based On Cuckoo Filter.

5. Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification.

6. Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem.

7. Strongly Menger Connectedness of a Class of Recursive Networks.

8. Introduction to Davies' paper.

9. Introducing the Special Section Theme: Recent Developments in Data Sources and Analysis for R&D Evaluation.

10. Collaboration structures between German immunology institutions, and gender visibility, as reflected in the Web.

11. Attitudes and access to electronic exchange of information on occupational disease.

12. DATA SHARING IN IOT ECOSYSTEMS AND COMPETITION LAW: THE EXAMPLE OF CONNECTED CARS.

13. UK Performance Engineering Workshop 2010.

14. Co-SVC-MDC-Based Cooperative Video Streaming Over Vehicular Networks.

15. A New Approach for Network Vulnerability Analysis.

16. The concept of knowledge in the context of electronic networking.

17. Adaptive Statistical Signatures of Network Soft-Failures in User Devices.

18. Decentralized Monitoring of Moving Objects in a Transportation Network Augmented with Checkpoints.

19. Modelling on-line reliability and risk to schedule the preventive maintenance of repairable assets in network utilities.

20. Clustering extension of MOVICAB-IDS to distinguish intrusions in flow-based data.

21. Cluster-Based MAC Protocol for Collision Avoidance and TDMA Scheduling in Underwater Wireless Sensor Networks.

22. Multiprocessors and Asynchronous Event Handling in the Real-Time Specification for Java.

23. Bugs: Rethinking the History of Computing.

24. The Alpha of Indulgent Consensus.

25. Formal versus Material Ontologies for Information Systems Interoperation in the Semantic Web.

26. Pervasive Computing on Active Networks.

27. An Historical Study of the Beginnings of Packet Switching.

28. An Auction-Based Approach for Group Task Allocation in an Open Network Environment.

29. Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks.

30. Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks.

31. MC-2D: An Efficient and Scalable Multicoupon Scheme.

32. Cache Freshness in Named Data Networking for the Internet of Things.

33. Information Inequality and Broadband Network Access: an Analysis of Australian Household Data.

34. Regulatory Pricing Rules to Neutralize Network Dominance.

35. DESIGNING ORDER-BOOK TRANSPARENCY IN ELECTRONIC COMMUNICATION NETWORKS.

36. The Digital Divide Objectified in the Design: Use of the Mobile Telephone by Underprivileged Youth in Sri Lanka.

37. A Highly Parallelized Decoder for Random Network Coding leveraging GPGPU.

38. IPv6 Security Issues in Cooperative Intelligent Transportation Systems.

39. A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach.

40. A Class of Contracting Stream Operators†.

41. Node-to-Set Disjoint-Path Routing in Hierarchical Cubic Networks.

42. Exploring Causal Relationships with Streaming Features*.

43. Strategies and Metric for Resilience in Computer Networks.

44. Design Techniques Targeting Low-Area–Power-Delay Product in Hyperbolic CORDIC Algorithm.

45. PC-Nash: QoS Provisioning Framework With Path-Classification Scheme Under Nash Equilibrium.

46. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.

47. The Edge-Fault-Tolerant Bipancyclicity of the Even k-ary n-cube.

48. The Bipancycle-Connectivity and the m-Pancycle-Connectivity of the k-ary n-cube.

49. Time–Space Opportunistic Routing in Wireless Ad hoc Networks: Algorithms and Performance Optimization by Stochastic Geometry.

50. A Rule-based Method for Improving Adaptability in Pervasive Systems.