![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Network and Computer Applications, Volume 105
Volume 105, March 2018
- Mahmoud Mohamed Bahnasy, Halima Elbiaze, Bochra Boughzala:
Zero-queue ethernet congestion control protocol based on available bandwidth estimation. 1-20 - Maryam Amiri
, Leili Mohammad Khanli
, Raffaela Mirandola
:
A sequential pattern mining model for application workload prediction in cloud environment. 21-62 - Iván Vidal
, Jaime García-Reinoso
, Ignacio Soto
, Francisco Valera
, Diego R. López:
SCoT: A secure content-oriented transport. 63-78 - Naresh Kumar Reddy Beechu
, Vasantha Moodabettu Harishchandra, Nithin Kumar Yernad Balachandra:
An energy-efficient fault-aware core mapping in mesh-based network on chip systems. 79-87 - Jorge Blasco, Thomas M. Chen
, Igor Muttik, Markus Roggenbach
:
Detection of app collusion potential using logic programming. 88-104 - Gao Liu, Zheng Yan
, Witold Pedrycz:
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey. 105-122 - André Naz, Benoît Piranda, Julien Bourgeois, Seth Copen Goldstein:
A time synchronization protocol for large-scale distributed embedded systems with low-precision clocks and neighbor-to-neighbor communications. 123-142
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.