Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
21 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.3 - Network Operations
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
Lei Shu
,
Manfred Hauswirth
,
Yan Zhang
,
Jianhua Ma
,
Geyong Min
,
Yu Wang
10.3217/jucs-016-10-1343
28-05-2010
Unique: 372 | Total: 459
| Access Period:
1343-1367
HTML
XML
PDF
Research Article
Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming
Ting Peng
,
Qinghua Zheng
,
Yinli Jin
10.3217/jucs-015-09-2011
01-05-2009
Unique: 338 | Total: 434
| Access Period:
2011-2025
HTML
XML
PDF
Research Article
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
Chin-Ling Chen
10.3217/jucs-015-02-0488
28-01-2009
Unique: 303 | Total: 361
| Access Period:
488-504
HTML
XML
PDF
Research Article
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
SungSoo Lee
,
HangKon Kim
,
ChongGun Kim
10.3217/jucs-014-07-1105
01-04-2008
Unique: 337 | Total: 400
| Access Period:
1105-1117
HTML
XML
PDF
Research Article
Passive Estimation of Quality of Experience
Denis Collange
,
Jean-Laurent Costeux
10.3217/jucs-014-05-0625
01-03-2008
Unique: 278 | Total: 320
| Access Period:
625-641
HTML
XML
PDF
Research Article
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
Leszek Borzemski
10.3217/jucs-013-02-0287
28-02-2007
Unique: 393 | Total: 480
| Access Period:
287-316
HTML
XML
PDF
Research Article
A Methodology and a Toolkit that Integrate Technological, Organisational, and Human Factors to Design KM within Knowledge-Intensive Networks
Tomaso Forzi
,
Meikel Peters
10.3217/jucs-011-04-0495
28-04-2005
Unique: 377 | Total: 438
| Access Period:
495-525
HTML
XML
PDF
Research Article
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
Daniel Hong
,
Choong Hong
,
Yoo Hyoung
,
Dong-Sik Yun
,
Woo-Sung Kim
10.3217/jucs-008-07-0698
28-07-2002
Unique: 379 | Total: 437
| Access Period:
698-721
HTML
XML
PDF
Research Article
Telecommunication Services and Service Management Challenges
John Buford
10.3217/jucs-007-05-0355
28-05-2001
Unique: 341 | Total: 394
| Access Period:
355-365
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK