Abstract is missing.
- servload: Generating representative workloads for web server benchmarkingJörg Zinke, Jan Habenschuss, Bettina Schnor. 1-8 [doi]
- MAP/SM/1/b model of a store and forward router interfaceKrzysztof Rusek, Zdzislaw Papir, Lucjan Janowski. 1-8 [doi]
- Impact of intermittent connectivity for telemetry server applications of vehicular embedded systems in agribusiness: Study and modeling of hi-performance architectureDaniel Mezzalira, Luis Carlos Trevelin. 1-6 [doi]
- Modelling packet capturing in a traffic monitoring system based on LinuxLuis Zabala, Armando Ferro, Alberto Pineda. 1-6 [doi]
- A model of a finite buffer shared by queues with batched poisson arrivalsMiron Vinarskiy. 1-7 [doi]
- Maximum throughput computation of an application in a multi-tier environmentSubhasri Duttagupta, Manoj K. Nambiar. 1-7 [doi]
- A fast-converging TCP-equivalent window-averaging rate control schemeShih-Chiang Tsao, Yuan-Cheng Lai, Ying-Dar Lin. 1-6 [doi]
- MILP formulation for squeezed protection in Spectrum-Sliced Elastic Optical Path NetworksK. D. R. Assis, R. C. Almeida, Helio Waldman. 1-7 [doi]
- ATRC: A swarm-based robot team coordination protocol for mine detection and unknown space discoveryFloriano De Rango, Nunzia Palmieri. 1-7 [doi]
- Reliability and survivability of vehicular ad hoc networksSelvamuthu Dharmaraja, Resham Vinayak, Xiaomin Ma, Kishor S. Trivedi. 1-7 [doi]
- Traffic-level community protection in telecommunication networks under large-scale failuresVictor Torres-Padrosa, Marc Manzano, Eusebi Calle, Josep L. Marzo. 1-8 [doi]
- Research on VoIP traffic detectionMuhammad Mazhar Ullah Rathore, Tahir Mehmood. 1-5 [doi]
- Creating and using Key Network-Performance Indicators to support the design of change of enterprise infocommunication infrastructureLászló Muka, Gergely Muka. 1-6 [doi]
- Enhancing the Oakley key agreement protocol with secure time informationPawel Szalachowski, Zbigniew Kotulski. 1-8 [doi]
- An error concealment technique and learning web designWan-Chun Lee, Yuan-Chen Liu, Hsin I Yung, Ming-kuan Lee. 1-8 [doi]
- An optimal scheduling policy for a two-flow priority queue with alternate pathsEssia Hamouda Elhafsi, Nathalie Mitton, David Simplot-Ryl. 1-8 [doi]
- Evaluation of routing schemes in opportunistic networks considering energy consumptionAnnalisa Socievole, Floriano De Rango. 1-7 [doi]
- A new Markov-based mobility prediction scheme for wireless networks with mobile hostsPeppino Fazio, Salvatore Marano. 1-5 [doi]
- Deriving test procedures of Low-Rate Wireless Personal Area NetworksMarina Eskola, Tapio Heikkilä, Pirkka Tukeva. 1-8 [doi]
- Social and dynamic graph-based scalable routing protocol in a DTN networkFloriano De Rango, Filippo Monteverdi. 1-8 [doi]
- Empirically characterizing the buffer behaviour of real devicesLuis Sequeira, Julián Fernández-Navajas, Jose Saldana, Luis Casadesus. 1-6 [doi]
- Smart proxying for reducing network energy consumptionRafiullah Khan, Raffaele Bolla, Matteo Repetto, Roberto Bruschi, Maurizio Giribaldi. 1-8 [doi]
- Opportunistic estimation of television audience through smartphonesIgor Bisio, Alessandro Delfino, Giulio Luzzati, Fabio Lavagetto, Mario Marchese, Cristina Frà, Massimo Valla. 1-5 [doi]
- Exposing resources as Web services: A performance oriented approachRavishankar Kanagasundaram, Shikharesh Majumdar, Marzia Zaman, Pradeep Srivastava, Nishith Goel. 1-10 [doi]
- PHISON: Playground for High-level Simulations On NetworksMarc Manzano, Juan Segovia, Eusebi Calle, José-Luis Marzo. 1-6 [doi]
- Traffic optimization for TCP-based Massive Multiplayer Online GamesJose Saldana, Luis Sequeira, Julián Fernández-Navajas, José Ruíz-Mas. 1-8 [doi]
- Traffic merging for energy-efficient datacenter networksAlessandro Carrega, Suresh Singh, Roberto Bruschi, Raffaele Bolla. 1-5 [doi]
- An experimental evaluation of server performance in Networked Virtual EnvironmentsJuan Luis Font, José Luis Sevillano, Daniel Cascado Caballero. 1-6 [doi]
- Capacity Planning of Enterprise Information System through SimulationSara A. Saleem, Paulvanna Nayaki Marimuthu, Sami J. Habib. 1-6 [doi]
- Wireless Sensor Network deployment using DEVS formalism and GIS representationBastien Poggi, Thierry Antoine-Santoni. 1-6 [doi]
- Two-level scheduling algorithm for different classes of traffic in WiMAX networksZeeshan Ahmed, Salima Hamma. 1-7 [doi]
- Directing requests and acquiring knowledge in a large-scale Grid systemKonstantinos I. Karaoglanoglou, Helen D. Karatza. 1-8 [doi]