direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Publications by Type: Book Chapters

2012

Sastry, Nishanth and Hui, Pan (2012). Path Formation in Human Contact Networks [4]. Handbook of Optimization in Complex Networks, Part 3. Springer, 349–385.


Lee, Kyunghan and Hui, Pan and Chong, Song (2012). Mobility Models in opportunistic networks [5]. Mobile Ad hoc networking: the cutting edge directions. Wiley.


2011

Schmid, Stefan and Wattenhofer, Roger (2011). Peer-to-Peer [6]. Encyclopedia of Parallel Computing. Springer.


Haddadi, Hamed and Hui, Pan and Henderson, Tristan and Brown, Ian (2011). Targeted Advertising on the Handset: Privacy and Security Challenges [7]. Pervasive Advertising. Springer, 119–137.


2010

Feldmann, Anja (2010). The Internet Architecture – Is a Redesign Needed? [8]. Netzwelt – Wege, Werte, Wandel. Springer, 147–160.


Roth, Volker and Schmidt, Philipp (2010). Pseudonymety and Anonymety [9]. Handbook of eID Security: Concepts, Practical Experiences, Technologies. Publicis Publishing, 31–44.


Buchegger, Sonja and Krishnamurthy, Sudha (2010). Sensor Network Economics [10]. Handbook on Sensor Networks. World Scientific Publishing Company, 835–852.


Iannone, Luigi and Levä, Tapio (2010). Modeling the economics of Loc/ID Split for the Future Internet [11]. Towards the Future Internet – Emerging Trends from European Research. IOS Press, 11–20.


2009

Feldmann, Anja and Fischer, Simon and Kammenhuber, Nils and Vöcking, Berthold (2009). Management of Variable Data Streams in Networks [12]. Algorithmics of Large and Complex Networks – Design, Analysis, and Simulation. Springer Wissenschaftsverlag, 266–291.


Conti, Marco and Crowcroft, Jon and Giordano, Silvia and Hui, Pan and Nguyen, Hoang Ang and Passarella, Andrea (2009). Routing Issues in Opportunistic Networks [13]. Middelware for Network Eccentric and Mobile Applications (MiNEMA State-of-the-Art Book). Springer, 121–147.


2008

Iannone, Luigi (2008). MeshDVNet: A fully functional IPv6 Wireless Mesh Network test-bed [14]. Wireless Mesh Networking. McGraw-Hill, 100–108.


Schaffrath, Gregor and Stiller, Burkhard (2008). Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection [15]. Resilient Services and Networks. Springer, 190–194.


Aggarwal, Vinay and Feldmann, Anja and Görke, Robert and Gaertler, Marco and Wagner, Dorothea (2008). A Visualization-Driven Approach to Overlay-Underlay Engineering [16]. The European Integrated Project ''Dynamically Evolving, Large-scale Information Systems (DELIS)''. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 81–98.


Schmid, Stefan and Wattenhofer, Roger (2008). Modeling Sensor Networks [17]. Algorithms and Protocols for Sensor Networks. John Wiley & Sons.


Botta, Alessio and Pescapé, Antonio and Karrer, Roger (2008). Wireless Networks Test-beds: When Heterogeneity Plays With Us [18]. Heterogeneous Wireless Access Networks, Architectures and Protocols. Springer US, 439–456.


2007

Buchegger, Sonja and Chuang, John (2007). Encouraging Cooperative Interaction among Network Entities [19]. Cognitive Wireless Networks – Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications. Springer Netherlands, 87–108.


2006

Agarwal, Sachin (2006). Data Synchronization Protocols [20]. Handbook of Mobile Middleware. Auerbach Publications, 207–228.


2002

Feldmann, Anja (2002). Characteristics of TCP Connection Arrivals [21]. Self-Similar Network Traffic and Performance Evaluation. John Wiley & Sons, Inc., 367–299.


------ Links: ------

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008