default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm20.bht:"
@article{DBLP:journals/ijnm/AnhaltKP10, author = {Fabienne Anhalt and Guilherme Pi{\^{e}}gas Koslovski and Pascale Vicat{-}Blanc Primet}, title = {Specifying and provisioning virtual infrastructures with HIPerNET}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {3}, pages = {129--148}, year = {2010}, url = {https://doi.org/10.1002/nem.732}, doi = {10.1002/NEM.732}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/AnhaltKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/AparnaA10, author = {R. Aparna and B. B. Amberker}, title = {A key management scheme for secure group communication using binomial key trees}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {6}, pages = {383--418}, year = {2010}, url = {https://doi.org/10.1002/nem.742}, doi = {10.1002/NEM.742}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AparnaA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BirkeMPR10, author = {Robert Birke and Marco Mellia and Michele Petracca and Dario Rossi}, title = {Experiences of VoIP traffic monitoring in a commercial {ISP}}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {5}, pages = {339--359}, year = {2010}, url = {https://doi.org/10.1002/nem.758}, doi = {10.1002/NEM.758}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/BirkeMPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BiswasPCG10, author = {Pratik K. Biswas and Alexander Poylisher and Ritu Chadha and Abhrajit Ghosh}, title = {Integrated network experimentation for QoS measurements in opaque MANETs}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {4}, pages = {199--218}, year = {2010}, url = {https://doi.org/10.1002/nem.727}, doi = {10.1002/NEM.727}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BiswasPCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CherkaouiFG10, author = {Omar Cherkaoui and Olivier Festor and Lisandro Zambenedetti Granville}, title = {Special issue on virtualization}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {3}, pages = {109}, year = {2010}, url = {https://doi.org/10.1002/nem.744}, doi = {10.1002/NEM.744}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/CherkaouiFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ChuangT10, author = {Yun{-}Hsin Chuang and Yuh{-}Min Tseng}, title = {An efficient dynamic group key agreement protocol for imbalanced wireless networks}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {4}, pages = {167--180}, year = {2010}, url = {https://doi.org/10.1002/nem.739}, doi = {10.1002/NEM.739}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/ChuangT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DAlconzoCR10, author = {Alessandro D'Alconzo and Angelo Coluccia and Peter Romirer{-}Maierhofer}, title = {Distribution-based anomaly detection in 3G mobile networks: from theory to practice}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {5}, pages = {245--269}, year = {2010}, url = {https://doi.org/10.1002/nem.747}, doi = {10.1002/NEM.747}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DAlconzoCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DewaeleHBFAMFCE10, author = {Guillaume Dewaele and Yosuke Himura and Pierre Borgnat and Kensuke Fukuda and Patrice Abry and Olivier J. J. Michel and Romain Fontugne and Kenjiro Cho and Hiroshi Esaki}, title = {Unsupervised host behavior classification from connection patterns}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {5}, pages = {317--337}, year = {2010}, url = {https://doi.org/10.1002/nem.750}, doi = {10.1002/NEM.750}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DewaeleHBFAMFCE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/FreitasPMV10, author = {Ricardo B. Freitas and Luciano Bernardes de Paula and Edmundo Roberto Mauro Madeira and F{\'{a}}bio Luciano Verdi}, title = {Using virtual topologies to manage inter-domain QoS in next-generation networks}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {3}, pages = {111--128}, year = {2010}, url = {https://doi.org/10.1002/nem.734}, doi = {10.1002/NEM.734}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/FreitasPMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/GalaniTKD10, author = {Aristi Galani and Kostas Tsagkaris and Nikolaos Koutsouris and Panagiotis Demestichas}, title = {Design and assessment of functional architecture for optimized spectrum and radio resource management in heterogeneous wireless networks}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {4}, pages = {219--241}, year = {2010}, url = {https://doi.org/10.1002/nem.736}, doi = {10.1002/NEM.736}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/GalaniTKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HausheerSS10, author = {David Hausheer and George D. Stamoulis and Burkhard Stiller}, title = {Special issue of the international journal on network management {(IJNM)} on 'economic traffic management'Publication: February 2011}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {2}, pages = {107}, year = {2010}, url = {https://doi.org/10.1002/nem.738}, doi = {10.1002/NEM.738}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HausheerSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HimuraFCE10, author = {Yosuke Himura and Kensuke Fukuda and Kenjiro Cho and Hiroshi Esaki}, title = {An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {5}, pages = {295--316}, year = {2010}, url = {https://doi.org/10.1002/nem.749}, doi = {10.1002/NEM.749}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HimuraFCE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/JagadishG10, author = {Chundury Jagadish and Timothy A. Gonsalves}, title = {Distributed control of event floods in a large telecom network}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {2}, pages = {57--70}, year = {2010}, url = {https://doi.org/10.1002/nem.728}, doi = {10.1002/NEM.728}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/JagadishG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiZLY10, author = {Jun Li and Shunyi Zhang and Cuilian Li and Junrong Yan}, title = {Composite lightweight traffic classification system for network management}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {2}, pages = {85--105}, year = {2010}, url = {https://doi.org/10.1002/nem.735}, doi = {10.1002/NEM.735}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LiZLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/NassefBF10, author = {Mohammad Nassef and Amr Badr and Ibrahim Farag}, title = {An immunological approach for file recovery over {JXTA} peer-to-peer framework}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {4}, pages = {181--197}, year = {2010}, url = {https://doi.org/10.1002/nem.741}, doi = {10.1002/NEM.741}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/NassefBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ParkKCHLJC10, author = {Chang{-}Keun Park and Joon{-}Myung Kang and Mi{-}Jung Choi and James Won{-}Ki Hong and Yong{-}Hun Lim and Seongho Ju and Moon{-}Suk Choi}, title = {Development and testing of an SNMP-based integrated management system for heterogeneous power line communication networks}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {1}, pages = {35--55}, year = {2010}, url = {https://doi.org/10.1002/nem.731}, doi = {10.1002/NEM.731}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ParkKCHLJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/PilakkatJ10, author = {Reena Pilakkat and Lillykutty Jacob}, title = {Scheduling and power control for {MAC} layer design in multihop {IR-UWB} networks}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {1}, pages = {1--19}, year = {2010}, url = {https://doi.org/10.1002/nem.721}, doi = {10.1002/NEM.721}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/PilakkatJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RicciatoOP10, author = {Fabio Ricciato and Philippe Owezarski and Maria Papadopouli}, title = {Preface to special issue on 'traffic monitoring and network measurements: from theory to practice'}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {5}, pages = {243--244}, year = {2010}, url = {https://doi.org/10.1002/nem.746}, doi = {10.1002/NEM.746}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/RicciatoOP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RubinZ10, author = {Izhak Rubin and Runhe Zhang}, title = {Max-min utility fair flow management for networks with route diversity}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {6}, pages = {361--381}, year = {2010}, url = {https://doi.org/10.1002/nem.740}, doi = {10.1002/NEM.740}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/RubinZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SalemVG10, author = {Osman Salem and Sandrine Vaton and Annie Gravey}, title = {A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {5}, pages = {271--293}, year = {2010}, url = {https://doi.org/10.1002/nem.748}, doi = {10.1002/NEM.748}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SalemVG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/TsugawaF10, author = {Maur{\'{\i}}cio O. Tsugawa and Jos{\'{e}} A. B. Fortes}, title = {Characterizing user-level network virtualization: performance, overheads and limits}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {3}, pages = {149--166}, year = {2010}, url = {https://doi.org/10.1002/nem.733}, doi = {10.1002/NEM.733}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/TsugawaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/WangG10, author = {Xiaonan Wang and Demin Gao}, title = {Research on IPv6 address configuration for wireless sensor networks}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {6}, pages = {419--432}, year = {2010}, url = {https://doi.org/10.1002/nem.743}, doi = {10.1002/NEM.743}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/WangG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/WanrooijP10, author = {Ward van Wanrooij and Aiko Pras}, title = {Filtering spam from bad neighborhoods}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {6}, pages = {433--444}, year = {2010}, url = {https://doi.org/10.1002/nem.753}, doi = {10.1002/NEM.753}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/WanrooijP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Yang10, author = {Shin{-}Jer Yang}, title = {Design issues and performance analysis for {DSR} routing with reclaim-based caching in MANETs}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {1}, pages = {21--34}, year = {2010}, url = {https://doi.org/10.1002/nem.726}, doi = {10.1002/NEM.726}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Yang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/YangXYY10, author = {Bin Yang and Jinwu Xu and Jianhong Yang and Debin Yang}, title = {A novel weighted clustering algorithm in mobile ad hoc networks using discrete particle swarm optimization {(DPSOWCA)}}, journal = {Int. J. Netw. Manag.}, volume = {20}, number = {2}, pages = {71--84}, year = {2010}, url = {https://doi.org/10.1002/nem.730}, doi = {10.1002/NEM.730}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/YangXYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.