Works matching IS 10184864 AND DT 2013 AND VI 52 AND IP 2
Results: 90
Recovering a game model from an optimal channel access scheme for WLANs.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 475, doi. 10.1007/s11235-011-9450-3
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 583, doi. 10.1007/s11235-011-9502-8
- By:
- Publication type:
- Article
Guest editorial.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 361, doi. 10.1007/s11235-011-9443-2
- By:
- Publication type:
- Article
Integrated optimization of aggregation and core for varying NGN architectures.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1067, doi. 10.1007/s11235-011-9613-2
- By:
- Publication type:
- Article
Risk based resilient network design.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 799, doi. 10.1007/s11235-011-9578-1
- By:
- Publication type:
- Article
A QoS-aware admission control scheme for bottleneck mitigation in Next-Generation Networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 397, doi. 10.1007/s11235-011-9455-y
- By:
- Publication type:
- Article
A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1399, doi. 10.1007/s11235-011-9652-8
- By:
- Publication type:
- Article
Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 375, doi. 10.1007/s11235-011-9449-9
- By:
- Publication type:
- Article
Developing network configuration management database system and its application-data federation for network management.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 993, doi. 10.1007/s11235-011-9607-0
- By:
- Publication type:
- Article
Reliable anycast and unicast routing: protection against attacks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 889, doi. 10.1007/s11235-011-9583-4
- By:
- Publication type:
- Article
Leader election on tree-based centrality in ad hoc networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 661, doi. 10.1007/s11235-011-9510-8
- By:
- Publication type:
- Article
Conservative snapshot-based actor garbage collection for distributed mobile actor systems.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 647, doi. 10.1007/s11235-011-9509-1
- By:
- Publication type:
- Article
Lightpath design & management system for IP-over-CWDM networks with ROADMs, employing parallel processing.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1033, doi. 10.1007/s11235-011-9610-5
- By:
- Publication type:
- Article
Simultaneous optimization of unicast and anycast flows and replica location in survivable optical networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1043, doi. 10.1007/s11235-011-9611-4
- By:
- Publication type:
- Article
Improvement of an image encryption algorithm based on hyper-chaos.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 539, doi. 10.1007/s11235-011-9459-7
- By:
- Publication type:
- Article
Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 705, doi. 10.1007/s11235-011-9573-6
- By:
- Publication type:
- Article
Packet loss reduction during rerouting using network traffic analysis.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 861, doi. 10.1007/s11235-011-9581-6
- By:
- Publication type:
- Article
Interference cancellation for HNNPSO multiuser detection of UWB systems over multipath fading channel.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1191, doi. 10.1007/s11235-011-9634-x
- By:
- Publication type:
- Article
A flow admission control in Next Generation Networks with flow aggregate information exchange.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 363, doi. 10.1007/s11235-011-9444-1
- By:
- Publication type:
- Article
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 515, doi. 10.1007/s11235-011-9457-9
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 513, doi. 10.1007/s11235-011-9456-x
- By:
- Publication type:
- Article
On formal reachability analysis in networks with dynamic behavior.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 919, doi. 10.1007/s11235-011-9585-2
- By:
- Publication type:
- Article
Chaotic and AES cryptosystem for satellite imagery.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 573, doi. 10.1007/s11235-011-9462-z
- By:
- Publication type:
- Article
Energy efficiency based on high performance particle swarm optimization: a case study.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1293, doi. 10.1007/s11235-011-9641-y
- By:
- Publication type:
- Article
Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 445, doi. 10.1007/s11235-011-9447-y
- By:
- Publication type:
- Article
EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 497, doi. 10.1007/s11235-011-9452-1
- By:
- Publication type:
- Article
A model of large-scale Device Collaboration system based on PI-Calculus for green communication.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1313, doi. 10.1007/s11235-011-9643-9
- By:
- Publication type:
- Article
Inter-carrier SLA negotiation using Q-learning.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 611, doi. 10.1007/s11235-011-9505-5
- By:
- Publication type:
- Article
Wireless in-cabin communication for aircraft infrastructure.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1211, doi. 10.1007/s11235-011-9636-8
- By:
- Publication type:
- Article
Open-loop overload control algorithm for signalling traffic.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 387, doi. 10.1007/s11235-011-9445-0
- By:
- Publication type:
- Article
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1353, doi. 10.1007/s11235-011-9648-4
- By:
- Publication type:
- Article
PSTN services migration to IMS. Are SPs finally reaching the tipping point for large scale migrations?
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1057, doi. 10.1007/s11235-011-9612-3
- By:
- Publication type:
- Article
Towards an energy-aware Internet: modeling a cross-layer optimization approach.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1247, doi. 10.1007/s11235-011-9645-7
- By:
- Publication type:
- Article
Analytical model of the multi-service cellular network servicing multicast connections.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1091, doi. 10.1007/s11235-011-9615-0
- By:
- Publication type:
- Article
The study on a convergence security service for manufacturing industries.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1389, doi. 10.1007/s11235-011-9651-9
- By:
- Publication type:
- Article
Reconfigurable FM-UWB transmitter design for robust short range communications.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1133, doi. 10.1007/s11235-011-9629-7
- By:
- Publication type:
- Article
Collaborative spam filtering based on incremental ontology learning.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 693, doi. 10.1007/s11235-011-9513-5
- By:
- Publication type:
- Article
Reliable networks design and modeling (foreword).
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 701, doi. 10.1007/s11235-011-9572-7
- By:
- Publication type:
- Article
Printed circular disc compact planar antenna for UWB applications.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1171, doi. 10.1007/s11235-011-9632-z
- By:
- Publication type:
- Article
Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 563, doi. 10.1007/s11235-011-9461-0
- By:
- Publication type:
- Article
Comparison of IP-based and explicit paths for one-to-one fast reroute in MPLS networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 947, doi. 10.1007/s11235-011-9603-4
- By:
- Publication type:
- Article
Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 783, doi. 10.1007/s11235-011-9577-2
- By:
- Publication type:
- Article
Least Cost Routing (LCR) solution for inter-domain traffic distribution.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 979, doi. 10.1007/s11235-011-9606-1
- By:
- Publication type:
- Article
Networks for the e-society.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 931, doi. 10.1007/s11235-011-9601-6
- By:
- Publication type:
- Article
Channel estimation in ECMA-368-based UWB systems with unknown interference.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1159, doi. 10.1007/s11235-011-9631-0
- By:
- Publication type:
- Article
Green service over Internet of Things: a theoretical analysis paradigm.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1235, doi. 10.1007/s11235-011-9638-6
- By:
- Publication type:
- Article
Advances on intelligent network management.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 633, doi. 10.1007/s11235-011-9507-3
- By:
- Publication type:
- Article
Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 681, doi. 10.1007/s11235-011-9512-6
- By:
- Publication type:
- Article
A price-based approach to optimize resource sharing between cellular data networks and WLANs.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 485, doi. 10.1007/s11235-011-9451-2
- By:
- Publication type:
- Article
Optimizing network load balancing: an hybridization approach of metaheuristics with column generation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 959, doi. 10.1007/s11235-011-9604-3
- By:
- Publication type:
- Article