Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
181 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2 - COMPUTER-COMMUNICATION NETWORKS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Evaluation of Bluetooth Low Energy Capabilities for Tele-mobile Monitoring in Home-care
Antonio Jara
,
David Fernandez
,
Pablo Lopez
,
Miguel Zamora
,
Antonio Skarmeta
,
Leandro Marin
Part of: Ambient Assisted Living: Home Care
10.3217/jucs-019-09-1219
01-05-2013
Unique: 685 | Total: 873
| Access Period:
1219-1241
HTML
XML
PDF
Research Article
Co-Allocation with Collective Requests in Grid Systems
Matija Cankar
,
Matej Artač
,
Marjan Šterk
,
Uroš Lotrič
,
Boštjan Slivnik
10.3217/jucs-019-03-0282
01-02-2013
Unique: 485 | Total: 656
| Access Period:
282-300
HTML
XML
PDF
Research Article
Engineering Security into Distributed Systems: A Survey of Methodologies
Anton Uzunov
,
Eduardo Fernandez
,
Katrina Falkner
10.3217/jucs-018-20-2920
01-12-2012
Unique: 541 | Total: 678
| Access Period:
2920-3006
HTML
XML
PDF
Research Article
Multilevel Steganography: Improving Hidden Communication in Networks
Wojciech Frączek
,
Wojciech Mazurczyk
,
Krzysztof Szczypiorski
10.3217/jucs-018-14-1967
28-07-2012
Unique: 508 | Total: 726
| Access Period:
1967-1986
HTML
XML
PDF
Research Article
Two Local Search Strategies for Differential Evolution
Musrrat Ali
,
Millie Pant
,
Atulya Nagar
,
Chang Ahn
Part of: Recent Advances in Bio-Inspired Computing: Theory and Applications
10.3217/jucs-018-13-1853
01-07-2012
Unique: 478 | Total: 627
| Access Period:
1853-1870
HTML
XML
PDF
Research Article
A Novel Identity-based Network Architecture for Next Generation Internet
Pedro Martinez-Julia
,
Antonio Skarmeta
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1643
28-06-2012
Unique: 517 | Total: 697
| Access Period:
1643-1661
HTML
XML
PDF
Research Article
Network Planning for WiMAX-R Networks
Qiang Liu
,
Min Chen
,
Jie Zhang
,
Bingwen Shen
,
Zhong Chu
Part of: Internet of Things
10.3217/jucs-018-09-1194
01-05-2012
Unique: 512 | Total: 622
| Access Period:
1194-1217
HTML
XML
PDF
Research Article
Directed Path Based Authentication Scheme for the Internet of Things
Huansheng Ning
,
Hong Liu
,
Qing Liu
,
Genlin Ji
Part of: Internet of Things
10.3217/jucs-018-09-1112
01-05-2012
Unique: 479 | Total: 604
| Access Period:
1112-1131
HTML
XML
PDF
Research Article
A Metropolitan Taxi Mobility Model from Real GPS Traces
Hongyu Huang
,
Daqiang Zhang
,
Yanmin Zhu
,
Minglu Li
,
Min-You Wu
Part of: Internet of Things
10.3217/jucs-018-09-1072
01-05-2012
Unique: 445 | Total: 546
| Access Period:
1072-1092
HTML
XML
PDF
Research Article
Adaptive Group Key Management Protocol for Wireless Communications
Saïd Gharout
,
Abdelmadjid Bouabdallah
,
Yacine Challal
,
Mohammed Achemlal
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0874
28-03-2012
Unique: 483 | Total: 603
| Access Period:
874-898
HTML
XML
PDF
Research Article
Countermeasures to Prevent Misbehaviour in VANETs
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0857
28-03-2012
Unique: 546 | Total: 710
| Access Period:
857-873
HTML
XML
PDF
Research Article
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment
Oscar Rebollo
,
Daniel Mellado
,
Eduardo Fernández-Medina
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0798
28-03-2012
Unique: 591 | Total: 780
| Access Period:
798-815
HTML
XML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK