Found: 90
Select item for more details and to access through your institution.
Guest editorial.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 361, doi. 10.1007/s11235-011-9443-2
- By:
- Publication type:
- Article
A flow admission control in Next Generation Networks with flow aggregate information exchange.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 363, doi. 10.1007/s11235-011-9444-1
- By:
- Publication type:
- Article
Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 375, doi. 10.1007/s11235-011-9449-9
- By:
- Publication type:
- Article
Open-loop overload control algorithm for signalling traffic.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 387, doi. 10.1007/s11235-011-9445-0
- By:
- Publication type:
- Article
A QoS-aware admission control scheme for bottleneck mitigation in Next-Generation Networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 397, doi. 10.1007/s11235-011-9455-y
- By:
- Publication type:
- Article
A subspace-based blind detector with rapid channel tracking structure for TH-UWB systems over time-varying multi-path channels.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 413, doi. 10.1007/s11235-011-9446-z
- By:
- Publication type:
- Article
A critical line based boundary surveillance strategy in wireless sensor networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 423, doi. 10.1007/s11235-011-9453-0
- By:
- Publication type:
- Article
Self-stability of slotted ALOHA by limiting the number of retransmission trials in infrastructure-less wireless networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 435, doi. 10.1007/s11235-011-9454-z
- By:
- Publication type:
- Article
Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 445, doi. 10.1007/s11235-011-9447-y
- By:
- Publication type:
- Article
A novel predictive scheduling handover on mobile IPv6.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 461, doi. 10.1007/s11235-011-9448-x
- By:
- Publication type:
- Article
Recovering a game model from an optimal channel access scheme for WLANs.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 475, doi. 10.1007/s11235-011-9450-3
- By:
- Publication type:
- Article
A price-based approach to optimize resource sharing between cellular data networks and WLANs.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 485, doi. 10.1007/s11235-011-9451-2
- By:
- Publication type:
- Article
EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 497, doi. 10.1007/s11235-011-9452-1
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 513, doi. 10.1007/s11235-011-9456-x
- By:
- Publication type:
- Article
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 515, doi. 10.1007/s11235-011-9457-9
- By:
- Publication type:
- Article
Chaotic image encryption system using phase-magnitude transformation and pixel substitution.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 525, doi. 10.1007/s11235-011-9458-8
- By:
- Publication type:
- Article
Improvement of an image encryption algorithm based on hyper-chaos.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 539, doi. 10.1007/s11235-011-9459-7
- By:
- Publication type:
- Article
A chaotic encryption scheme for real-time embedded systems: design and implementation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 551, doi. 10.1007/s11235-011-9460-1
- By:
- Publication type:
- Article
Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 563, doi. 10.1007/s11235-011-9461-0
- By:
- Publication type:
- Article
Chaotic and AES cryptosystem for satellite imagery.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 573, doi. 10.1007/s11235-011-9462-z
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 583, doi. 10.1007/s11235-011-9502-8
- By:
- Publication type:
- Article
Logarithmic laws in service quality perception: where microeconomics meets psychophysics and quality of experience.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 587, doi. 10.1007/s11235-011-9503-7
- By:
- Publication type:
- Article
A model of network neutrality with usage-based prices.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 601, doi. 10.1007/s11235-011-9504-6
- By:
- Publication type:
- Article
Inter-carrier SLA negotiation using Q-learning.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 611, doi. 10.1007/s11235-011-9505-5
- By:
- Publication type:
- Article
Stock provisioning strategies for QoS at the interdomain level.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 623, doi. 10.1007/s11235-011-9506-4
- By:
- Publication type:
- Article
Advances on intelligent network management.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 633, doi. 10.1007/s11235-011-9507-3
- By:
- Publication type:
- Article
Parallelizing Multiple Group-by queries using MapReduce: optimization and cost estimation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 635, doi. 10.1007/s11235-011-9508-2
- By:
- Publication type:
- Article
Conservative snapshot-based actor garbage collection for distributed mobile actor systems.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 647, doi. 10.1007/s11235-011-9509-1
- By:
- Publication type:
- Article
Leader election on tree-based centrality in ad hoc networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 661, doi. 10.1007/s11235-011-9510-8
- By:
- Publication type:
- Article
A study on traffic management cooperating with IMS in MPLS networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 671, doi. 10.1007/s11235-011-9511-7
- By:
- Publication type:
- Article
Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 681, doi. 10.1007/s11235-011-9512-6
- By:
- Publication type:
- Article
Collaborative spam filtering based on incremental ontology learning.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 693, doi. 10.1007/s11235-011-9513-5
- By:
- Publication type:
- Article
Reliable networks design and modeling (foreword).
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 701, doi. 10.1007/s11235-011-9572-7
- By:
- Publication type:
- Article
Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 705, doi. 10.1007/s11235-011-9573-6
- By:
- Publication type:
- Article
Resilient routing in optical networks using SRLG-disjoint path pairs of min-sum cost.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 737, doi. 10.1007/s11235-011-9574-5
- By:
- Publication type:
- Article
Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 751, doi. 10.1007/s11235-011-9575-4
- By:
- Publication type:
- Article
Evaluation and estimation of the availability of p-cycle protected connections.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 767, doi. 10.1007/s11235-011-9576-3
- By:
- Publication type:
- Article
Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 783, doi. 10.1007/s11235-011-9577-2
- By:
- Publication type:
- Article
Risk based resilient network design.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 799, doi. 10.1007/s11235-011-9578-1
- By:
- Publication type:
- Article
A fast and accurate meta-heuristic for failure localization based on the monitoring trail concept.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 813, doi. 10.1007/s11235-011-9579-0
- By:
- Publication type:
- Article
Some more aspects of resilience.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 825, doi. 10.1007/s11235-011-9580-7
- By:
- Publication type:
- Article
An analysis of interdomain availability and causes of failures based on active measurements.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 847, doi. 10.1007/s11235-011-9586-1
- By:
- Publication type:
- Article
Packet loss reduction during rerouting using network traffic analysis.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 861, doi. 10.1007/s11235-011-9581-6
- By:
- Publication type:
- Article
Fast reroute paths algorithms.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 881, doi. 10.1007/s11235-011-9582-5
- By:
- Publication type:
- Article
Reliable anycast and unicast routing: protection against attacks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 889, doi. 10.1007/s11235-011-9583-4
- By:
- Publication type:
- Article
WDM network re-optimization avoiding costly traffic disruptions.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 907, doi. 10.1007/s11235-011-9584-3
- By:
- Publication type:
- Article
On formal reachability analysis in networks with dynamic behavior.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 919, doi. 10.1007/s11235-011-9585-2
- By:
- Publication type:
- Article
Networks for the e-society.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 931, doi. 10.1007/s11235-011-9601-6
- By:
- Publication type:
- Article
Volume-oriented routing and its modifications.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 935, doi. 10.1007/s11235-011-9602-5
- By:
- Publication type:
- Article
Comparison of IP-based and explicit paths for one-to-one fast reroute in MPLS networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 947, doi. 10.1007/s11235-011-9603-4
- By:
- Publication type:
- Article