The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NetCoM"( http://dblp.L3S.de/Venues/NetCoM )

URL (DBLP): http://dblp.uni-trier.de/db/conf/netcom

Publication years (Num. hits)
2009 (80)
Publication types (Num. hits)
inproceedings(79) proceedings(1)
Venues (Conferences, Journals, ...)
NetCoM(80)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 222 occurrences of 187 keywords

Results
Found 80 publication records. Showing 80 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1M. K. Kavitha Devi, P. Venkatesh 0001 An Improved Collaborative Recommender System. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fuzzy radial basis function network, Collaborative filtering, sparsity, cold start problem
1A. Revathi 0001, Y. Venkataramani Perceptual Features Based Isolated Digit and Continuous Speech Recognition Using Iterative Clustering Approach. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Speech recognition, Noise, Vector quantization, Spectral analysis, Speech processing, Clustering methods, Speech analysis, Frequency response, Pseudorandom sequence
1Jianwen Niu, Chang Liu, Jian Ma Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive Multi-Copy and Bidirectional Spread, Data Dissemination, Vehicular Ad-hoc Networks, Opportunistic Networks
1Girish Kumar Patnaik, M. M. Gore Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc Network. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rescue, peer-to-peer, MANET, tree, key
1Nirnay Ghosh, Soumya K. Ghosh 0001 An Approach for Security Assessment of Network Configurations Using Attack Graph. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network Security, Security Metric, Attack Graph
1Alper Ugur, Ibrahim Sogukpinar A Framework for Licensed Digital Signatures. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authorization, digital signature
1Nilesh B. Prajapati, Rupal R. Agravat, Mosin I. Hasan Comparative Study of Various Cooling Schedules for Location Area Planning in Cellular Networks Using Simulated Annealing. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Base Station Controller, Mobile Switching Center, Simulated Annealing, Location Update, Base Station, Mobile Station, Location Area
1Balakannan S. P, Yier Yan, Jae Seung Yang, Moon Ho Lee End-to-End Network Delay-Constrained for QoS Multicast Routing. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF End-to-End QoS Constraints, QoS, Multicast Routing, Delay Constraints
1Sooyeol Yang, Jeongbae Yun, Jangkyu Yun, Honggil Lee, Kijun Han Analysis and Proposal of Wireless Mesh Network's Routing Metric for WBAN. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mesh networks, routing metric
1Keiichi Sakakima, Shingo Ata, Hiroshi Kitamura Anonymous but Traceable IP Address-Based Communication System. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Node traceability, Anonymity, IPv6
1V. Vijayaraghavan, Sanjoy Kumar Paul iMeasure Security (iMS): A Novel Framework for Security Quantification. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Business impact, Likelihood estimation, Security quantification, Attack graph
1S. Muthuramalingam, P. Janani, B. Bavya, R. Rajaram An Energy-Conserving Topology Maintenance Algorithm for MANETs. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Transmission range, Topology formation, ad hoc networks, power optimization
1Asish K. Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debasish Saha, Dhinaharan Nagamalai An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF VHO, WON, CAC, Phase type distribution
1Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin Anomaly Behavior Analysis for Web Page Inspection. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious webpage, Anomaly behavior, Drive-by download
1Jilong Li, Jangkyu Yun, Junhyung Kim, Icksoo Lee, Kijun Han A Handoff Management Scheme for Mobile Station in Wireless Body Area Mesh Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Layer2, Wireless body area mesh networks, IEEE 802.11s, Mobility Management, Health monitoring
1Rajiv Misra, Ajay Shukla K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF K Bipartite Partitioning, Wireless Mesh Networks, MAC Protocol
1Anand Gupta, Harsh Bedi, M. S. Don Bosco, Vinay Shashidhar Accuracy of 3D Location Computation in GSM Through NS2. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Global System for Mobile Communication (GSM), Signal Attenuation, Triangularization, Signal Masts, Network, Global Positioning System (GPS), Network Simulator
1Kilari Veera Swamy, B. Chandra Mohan, Y. V. Bhaskar Reddy, Samayamantula Srinivas Kumar Energy Based Quantization for Image Compression Using Contourlet Transform. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Directional Filter Bank, Topological re-ordering, Quantization, Contourlet Transform, Laplacian Pyramid
1Samir K. Sadhukhan, Swarup Mandal, Debashis Saha A Practical Approach for Planning WLAN Deployment under 3G Cellular Network. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integration, WLAN, 3G, meta-heuristic, cost optimization, tight-coupling
1Marcharla Anjaneyulu Bhagyaveni, K. Rajeswari Performance Improvement of Wireless Sensor Networks Using Layered Space Time Codes. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF symbol error rate, wireless sensor network, MIMO, signal to noise ratio
1B. Malarkodi 0001, B. Prasana, B. Venkataramani A Scheduling Policy for Battery Management in Mobile Devices. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic programming, lifetime, battery, scheduling policy, mobile nodes
1Kiran K. Somasundaram, John S. Baras Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 A Pascal Graph Property and Computer Network Topology. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pascal Graph, Pascal Matrix, Dependable node of Pascal Graph, Computer Network Topology
1A. Nagaraju 0001, Ch. Ramya Krishna Performance Evaluation of ADV with AODV for Mobile Ad-hoc Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ADV, Proactive routing and Hybrid Routing, AODV
1Xu Huang 0001, Dharmendra Sharma 0001 Fuzzy Switching Controller for the Security in 802.11 Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shikha Goel, Sudesh Kumar An Improved Method of Detecting Spoofed Attack in Wireless LAN. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11 MAC address spoofing, transmission rate, Forge Resistance Relationship, false positive, false negative, sequence number, Rate analysis
1Gaurav Kapoor, Selwyn Piramuthu Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Authentication, RFID, vulnerability, Ownership Transfer
1Wouter Horré, Kevin Lee, Danny Hughes 0001, Sam Michiels, Wouter Joosen A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Scientific Workflows, Software Deployment
1Kaushik Ghosh 0002, Sarbani Roy, Pradip K. Das An Alternative Approach to Find the Fermat Point of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols: Global Minima Scheme. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Young-mi Baek, Byung-hwa Lee, Jeongbae Yun, Keuchul Cho, Kijun Han A Self-Adjustable Rate Control in Wireless Body Area Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF component, rate control, wireless body area networks
1Sasthi C. Ghosh 0001, Roger M. Whitaker, Stuart M. Allen, Steve Hurley Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1K. Thanigaivelu, K. Murugan Impact of Sink Mobility on Network Performance in Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Waypoint, Static Sink, Wireless Sensor Networks, Random Walk, Mobility Model, Network Lifetime, End to End Delay, Mobile Sink, Energy Dissipation, Success Rate
1Pankaj Gupta, Tarun Bansal, Manoj Misra MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Base station to node communication, Wireless Sensor Networks (WSN), Energy Efficiency, Wireless communication, Routing protocol
1B. Jagadeesh, Samayamantula Srinivas Kumar, K. Raja Rajeswari A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD). Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dither Quantization, Genetic Algorithm, Singular Value Decomposition, Digital Image Watermarking
1Yaser Miaji, Suhaidi Hassan Just Queueing (JQ): Scheduling Algorithm for the Internet. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Scheduling mechanism, Queueing algorithm, WFQ
1Ehsan Heidari, Ali Movaghar 0001 Intelligent Clustering in Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shortest distance, Genetic algorithm, clustering, Wireless sensor networks
1Kamaljit I. Lakhtaria Enhancing QoS and QoE in IMS Enabled Next Generation Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF VAS, QoS, IMS, NGN, QoE
1 First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009 Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  BibTeX  RDF
1Samrat Mondal, Shamik Sural Supporting Negative Authorization in Spatiotemporal Role Based Access Control. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Negative Authorization, Spatiotemporal Context, Access Control, RBAC
1Susmita Das, Bikramaditya Das Time Domain Equalization Technique Using RAKE-MMSE Receivers for High Data Rate UWB Communication System. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LE, UWB, Bit Error Rate, Rake Receiver, DFE
1Mohammed M. Kadhum, Suhaidi Hassan The FN Quadratic Marking/Dropping Probability Function. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fast Congestion Notification (FN), Packet Drop/Mark Probability, Gateway Buffer, Active Queue Management (AQM), Random Early Detection (RED)
1Natarajan Jaisankar, R. Saravanan 0001, K. Durai Swamy An Agent Based Security Framework for Protecting Routing Layer Operations in MANET. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network-layer security, honesty rate, routing, mobile ad hoc network, mobile agents, routing protocols, public key, packet forwarding, malicious nodes
1Mohammad Yamin, Yasser Ades Crowd Management with RFID and Wireless Technologies. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Behnam Dezfouli, Marjan Radi, Mohammad Ali Nematbakhsh Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IAMAC, Sensor Networks, Medium Access Control, Lifetime, Cross-Layer Optimization
1Chandravva Hebbi, S. V. Saboji Vertical Handoff in Heterogeneous Wireless Mobile Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless overlay networks, Handoff, QOS
1Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min Node Mobility Support Scheme Between the Mobile Network and PMIPv6 Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF NEMO, PMIPv6, node mobility
1Reshmi Maulik, Nabendu Chaki PhishNet: Enhancing the Security Aspect of IMS Users. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Vishing, SPIM, Spam, IMS, Phishing, Spoofing
1Turker Akyuz, Ibrahim Sogukpinar Packet Marking with Distance Based Probabilities for IP Traceback. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, DDoS attacks, IP Traceback, Probabilistic Packet Marking
1Sanat Sarangi, Subrat Kar A Novel Algorithm for Graded Precision Localization in Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fixed-grid, wireless sensor networks, localization, centroid, TDOA
1Mydhili K. Nair, V. Gopalakrishna Agent Based Web Services with RuleML for Network Management. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DamlRuleML, Agent Based Web Services, ECA Rule Engine, Network Management
1Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta Fault Analysis of Security Policy Implementations in Enterprise Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Control List(ACL), SAT based verification, Network Security, LAN
1Stanislav Nonchev, Mikko Valkama Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio Systems. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Neeraj Kumar Nehra, Manoj Kumar 0008, R. B. Patel Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Miyeon Yoon, Kwangkyum Lee, Mijoo Kim, Yongtae Shin Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multicast Security
1K. Saravanan, Arunkumar Thangavelu, K. Rameshbabu A Middleware Architectural framework for Vehicular Safety over VANET (InVANET). Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF middleware, VANET, intelligence, vehicle safety, IEEE-802.11p
1K. B. Chandradeep A Scheme for the Design and Implementation of a Distributed IDS. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed object application, intrusion detection, packet filtering, Distributed intrusion detection system
1Muhannad Quwaider, Azizah Muhammad, Jongeun Choi, Subir Biswas Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian Control. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Body Area Sensor Network, Transmission Power Assignment, Closed Loop Control, LQGI
1Abhishek Samanta, Dripto Bakshi, Amitava Mukherjee 0001, Mita Nasipuri Energy Efficient Wireless Sensor MAC Protocol for Collision Avoidance. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF single path, Wireless sensor networks, energy efficient, collision avoidance, multi path, data propagation, success rate
1Anu Bala, Munish Bansal, Jagpreet Singh Performance Analysis of MANET under Blackhole Attack. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blackhole, MANET, AODV
1S. Geetha 0001, Siva S. Sivatha Sindhu, V. Kabilan, N. Kamaraj High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Image Steganalysis, Information forensics, Markov Blanket Embedded Genetic Algorithm, Feature Selection
1A. John Prakash, V. Rhymend Uthariaraj Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Encryption, Key Management, Multicast Communication, Secure Multicast
1Boyoung Lee, Sojung Yang, Deokjai Choi A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home Server. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IR Controller, Electronic appliance state monitoring, ubiquitous home, home network
1Mosin I. Hasan, Nilesh B. Prajapati An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malware, Psychology, Spyware, Social Engineering
1Saurav Muralidharan, Sajin Koroth, Nevil Anto, Rafeeque Pandarachalil Galaxia: A Semi-decentralized System for Implementing Secure-Group P2P Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-p2p, semi-decentralized, secure group p2p, peer-to-peer
1Sheng-Tzong Cheng, Bo-Fu Chen, Chih-Lun Chou Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access Systems. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fair Strategy, Scheduling, QoS, WiMAX
1Arun Prakash, Rajesh Verma, Rajeev Tripathi, Kshirasagar Naik Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple mobile routers, vehicle communications, handover, NEMO
1Ashwin Ganesan On Some Sufficient Conditions for Distributed Quality-of-Service Support in Wireless Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weighted vertex coloring, quality-of-service (QoS), wireless networks, distributed algorithms, conflict graph, interference models, fractional
1S. Gowrishankar, Subir Kumar Sarkar, T. G. Basavaraju Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANET. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Simulations, MANET, Mobility Models, Performance Comparison, Group Model
1Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai "Reminder: please update your details": Phishing Trends. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF worms and trojon, spam, Phishing, virus, social engineering
1Muhannad Quwaider, Subir Biswas On-body Packet Routing Algorithms for Body Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Body Area Sensor Network, Delay Tolerant Networks, Probabilistic Routing, Location based Routing
1Sarvesh Kumar Varatharajan, Gunes Ercal-Ozkaya On a Local Heuristic for a Reverse Multicast Forwarding Game. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF incentive compatible topology control, heuristics for NP-Hard problems, random Euclidean power graphs, sensor networks, game theory, local algorithm, location based routing
1Sajal Saha, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhopadhyay, Dhinaharan Nagamalai Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HMIP, GFA, Care of Address, MAP
1Omar Almomani, Osman Gazali, Suhaidi Hassan Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Drop Tail, TCP, Forward Error Correction, Packet Loss
1Sumathy Subramaniam, B. Upendra Kumar Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neighborhood key, message specific key, ad hoc networks, spanning tree
1Shamala Subramaniam, Sangeetha Thavamani, Moqry A Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cricket/Mica2, field hockey, Discrete Event Simulator
1Siva Rama Krishnan Somayaji, Ch. A. S. Murty Securing Internet Protocol (IP) Storage: A Case Study. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireshak, SSLv2, Initiator, IPsec, Target, iSCSI
1Suparna DasGupta, Rituparna Chaki AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobility, MANET, Routing Protocol, Routing overhead
1A. Nagaraju 0001, B. Eswar Performance of Dominating Sets in AODV Routing Protocol for MANETs. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dominant pruning AODV, Dominating sets
1Kihyun Kim, Ick-Soo Lee, Mahnsuk Yoon, Junhyung Kim, Honggil Lee, Kijun Han An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor Networks. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless mobile sensor networks, GPS nodes, Energy efficient routing, Location based routing
1Osman Yagan, Armand M. Makowski Random Key Graphs. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random key graphs, Security, Wireless sensor networks, Small world networks, Key predistribution, Clustering coefficient
Displaying result #1 - #80 of 80 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license