Most Cited Articles

Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks

, 2013; 2(2): 91-101

Sandra Sendra, Ferran Llario, Lorena Parra, Jaime Lloret


DOI: 10.2174/22117407112016660012


Primer and Recent Developments on Fountain Codes

, 2013; 2(1): 2-11

Jalaluddin Qureshi, Chuan Heng Foh, Jianfei Cai


DOI: 10.2174/22117407112019990001


On the Impact of Rice and Rayleigh Channel Characterization on VoIP Services: a QoE Approach

, 2013; 2(2): 82-90

Ramon Sanchez-Iborra, Maria-Dolores Cano, Joan Garcia-Haro


DOI: 10.2174/22117407112016660010


A Tool Offering Steady-State Simulations for VANETs

, 2013; 2(2): 102-112

Miguel Báguena, Sergio M. Tornell, Álvaro Torres, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni


DOI: 10.2174/22117407112016660008


Scalable Resource and Admission Control in Class-Based Differentiated Networks

, 2013; 2(2): 113-126

Evariste Logota, Carlos Campos, Susana Sargento, Augusto Neto


DOI: 10.2174/22117407112016660011


Network-based Wi-Fi Localization Solution

, 2013; 2(2): 65-81

Hugo Fonseca, Paulo Salvador, António Nogueira


DOI: 10.2174/22117407112016660009


Detection of WPS Attacks Based on Multiscale Traffic Analysis

, 2013; 2(2): 127-129

Ivo Petiz, Eduardo Rocha, Paulo Salvador, António Nogueira


DOI: 10.2174/22117407112019990007


A Novel Scheduling Service for Distribution Pilot Protection Over a WiMAX Network

, 2013; 2(1): 26-40

Reduan H. Khan, Kaushik Mahata, Jamil Y Khan


DOI: 10.2174/22117407112019990005



Webmaster Contact: info@benthamscience.org
Copyright © 2018 Bentham Science