{
"result":{
"query":":facetid:toc:\"db/journals/cn/cn76.bht\"",
"status":{
"@code":"200",
"text":"OK"
},
"time":{
"@unit":"msecs",
"text":"190.52"
},
"completions":{
"@total":"1",
"@computed":"1",
"@sent":"1",
"c":{
"@sc":"13",
"@dc":"13",
"@oc":"13",
"@id":"55001670",
"text":":facetid:toc:db/journals/cn/cn76.bht"
}
},
"hits":{
"@total":"13",
"@computed":"13",
"@sent":"13",
"@first":"0",
"hit":[{
"@score":"1",
"@id":"4722439",
"info":{"authors":{"author":[{"@pid":"154/9430","text":"Rocío Acedo-Hernández"},{"@pid":"63/89","text":"Matías Toril"},{"@pid":"41/3316","text":"Salvador Luna-Ramírez"},{"@pid":"20/10097","text":"Isabel de la Bandera"},{"@pid":"154/9513","text":"N. Faour"}]},"title":"Analysis of the impact of PCI planning on downlink throughput performance in LTE.","venue":"Comput. Networks","volume":"76","pages":"42-54","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/Acedo-HernandezTLBF15","doi":"10.1016/J.COMNET.2014.10.023","ee":"https://doi.org/10.1016/j.comnet.2014.10.023","url":"https://dblp.org/rec/journals/cn/Acedo-HernandezTLBF15"},
"url":"URL#4722439"
},
{
"@score":"1",
"@id":"4722445",
"info":{"authors":{"author":[{"@pid":"47/8966","text":"Mustafa Ilhan Akbas"},{"@pid":"b/MatthiasRBrust","text":"Matthias R. Brust"},{"@pid":"15/5766","text":"Damla Turgut"},{"@pid":"22/5107","text":"Carlos H. C. Ribeiro"}]},"title":"A preferential attachment model for primate social networks.","venue":"Comput. Networks","volume":"76","pages":"207-226","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/AkbasBTR15","doi":"10.1016/J.COMNET.2014.11.009","ee":"https://doi.org/10.1016/j.comnet.2014.11.009","url":"https://dblp.org/rec/journals/cn/AkbasBTR15"},
"url":"URL#4722445"
},
{
"@score":"1",
"@id":"4722469",
"info":{"authors":{"author":[{"@pid":"119/9071","text":"Tomasz Bujlow"},{"@pid":"43/7972","text":"Valentín Carela-Español"},{"@pid":"54/4261","text":"Pere Barlet-Ros"}]},"title":"Independent comparison of popular DPI tools for traffic classification.","venue":"Comput. Networks","volume":"76","pages":"75-89","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/BujlowCB15","doi":"10.1016/J.COMNET.2014.11.001","ee":"https://doi.org/10.1016/j.comnet.2014.11.001","url":"https://dblp.org/rec/journals/cn/BujlowCB15"},
"url":"URL#4722469"
},
{
"@score":"1",
"@id":"4722478",
"info":{"authors":{"author":[{"@pid":"147/0478","text":"Tengfei Chang"},{"@pid":"44/6300","text":"Thomas Watteyne"},{"@pid":"50/6450","text":"Kris Pister"},{"@pid":"35/1647-4","text":"Qin Wang 0004"}]},"title":"Adaptive synchronization in multi-hop TSCH networks.","venue":"Comput. Networks","volume":"76","pages":"165-176","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/ChangWPW15","doi":"10.1016/J.COMNET.2014.11.003","ee":"https://doi.org/10.1016/j.comnet.2014.11.003","url":"https://dblp.org/rec/journals/cn/ChangWPW15"},
"url":"URL#4722478"
},
{
"@score":"1",
"@id":"4722490",
"info":{"authors":{"author":[{"@pid":"95/3689","text":"Luiz Henrique A. Correia"},{"@pid":"46/8102","text":"Thanh-Dien Tran"},{"@pid":"36/2045","text":"Vasco N. S. S. Pereira"},{"@pid":"139/7416","text":"João Carlos Giacomin"},{"@pid":"01/4877","text":"Jorge M. Sá Silva"}]},"title":"DynMAC: A resistant MAC protocol to coexistence in wireless sensor networks.","venue":"Comput. Networks","volume":"76","pages":"1-16","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/CorreiaTPGS15","doi":"10.1016/J.COMNET.2014.10.019","ee":"https://doi.org/10.1016/j.comnet.2014.10.019","url":"https://dblp.org/rec/journals/cn/CorreiaTPGS15"},
"url":"URL#4722490"
},
{
"@score":"1",
"@id":"4722507",
"info":{"authors":{"author":[{"@pid":"15/6081","text":"Xenofon Fafoutis"},{"@pid":"56/11298","text":"Alessio Di Mauro"},{"@pid":"138/2644","text":"Madava D. Vithanage"},{"@pid":"85/3106","text":"Nicola Dragoni"}]},"title":"Receiver-initiated medium access control protocols for wireless sensor networks.","venue":"Comput. Networks","volume":"76","pages":"55-74","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/FafoutisMVD15","doi":"10.1016/J.COMNET.2014.11.002","ee":"https://doi.org/10.1016/j.comnet.2014.11.002","url":"https://dblp.org/rec/journals/cn/FafoutisMVD15"},
"url":"URL#4722507"
},
{
"@score":"1",
"@id":"4722524",
"info":{"authors":{"author":[{"@pid":"82/3651","text":"Gyözö Gódor"},{"@pid":"58/10067","text":"Zoltán Jakó"},{"@pid":"129/0963","text":"Ádám Knapp"},{"@pid":"03/4861","text":"Sándor Imre"}]},"title":"A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions.","venue":"Comput. Networks","volume":"76","pages":"17-41","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/GodorJKI15","doi":"10.1016/J.COMNET.2014.10.016","ee":"https://doi.org/10.1016/j.comnet.2014.10.016","url":"https://dblp.org/rec/journals/cn/GodorJKI15"},
"url":"URL#4722524"
},
{
"@score":"1",
"@id":"4722598",
"info":{"authors":{"author":[{"@pid":"116/3038","text":"Michele Mangili"},{"@pid":"37/6549","text":"Fabio Martignon"},{"@pid":"05/600","text":"Stefano Paraboschi"}]},"title":"A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks.","venue":"Comput. Networks","volume":"76","pages":"126-145","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/MangiliMP15","doi":"10.1016/J.COMNET.2014.11.010","ee":"https://doi.org/10.1016/j.comnet.2014.11.010","url":"https://dblp.org/rec/journals/cn/MangiliMP15"},
"url":"URL#4722598"
},
{
"@score":"1",
"@id":"4722612",
"info":{"authors":{"author":[{"@pid":"29/10100","text":"Pablo Muñoz Luengo"},{"@pid":"97/3589","text":"Raquel Barco"},{"@pid":"20/10097","text":"Isabel de la Bandera"}]},"title":"Load balancing and handover joint optimization in LTE networks using Fuzzy Logic and Reinforcement Learning.","venue":"Comput. Networks","volume":"76","pages":"112-125","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/MunozBB15","doi":"10.1016/J.COMNET.2014.10.027","ee":"https://doi.org/10.1016/j.comnet.2014.10.027","url":"https://dblp.org/rec/journals/cn/MunozBB15"},
"url":"URL#4722612"
},
{
"@score":"1",
"@id":"4722662",
"info":{"authors":{"author":[{"@pid":"05/6609","text":"Sabrina Sicari"},{"@pid":"137/6736","text":"Alessandra Rizzardi"},{"@pid":"23/4819","text":"Luigi Alfredo Grieco"},{"@pid":"90/5778","text":"Alberto Coen-Porisini"}]},"title":"Security, privacy and trust in Internet of Things: The road ahead.","venue":"Comput. Networks","volume":"76","pages":"146-164","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/SicariRGC15","doi":"10.1016/J.COMNET.2014.11.008","ee":"https://doi.org/10.1016/j.comnet.2014.11.008","url":"https://dblp.org/rec/journals/cn/SicariRGC15"},
"url":"URL#4722662"
},
{
"@score":"1",
"@id":"4722707",
"info":{"authors":{"author":[{"@pid":"w/XuWang7","text":"Xu Wang 0007"},{"@pid":"21/1509-1","text":"Hailong Sun 0001"},{"@pid":"19/2205","text":"Ting Deng"},{"@pid":"58/1722","text":"Jinpeng Huai"}]},"title":"On the tradeoff of availability and consistency for quorum systems in data center networks.","venue":"Comput. Networks","volume":"76","pages":"191-206","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/WangSDH15","doi":"10.1016/J.COMNET.2014.11.006","ee":"https://doi.org/10.1016/j.comnet.2014.11.006","url":"https://dblp.org/rec/journals/cn/WangSDH15"},
"url":"URL#4722707"
},
{
"@score":"1",
"@id":"4722712",
"info":{"authors":{"author":[{"@pid":"43/10765","text":"Yuan Sheng Wu"},{"@pid":"65/4760-4","text":"Bing Guo 0004"},{"@pid":"23/5178-1","text":"Yan Shen 0001"},{"@pid":"38/9911","text":"Jihe Wang"},{"@pid":"41/5427","text":"Xiaobin Liu"}]},"title":"A Cross-Layer Optimization and Design approach under QoS constraints for green IP over WDM networks.","venue":"Comput. Networks","volume":"76","pages":"177-190","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/WuGSWL15","doi":"10.1016/J.COMNET.2014.10.025","ee":"https://doi.org/10.1016/j.comnet.2014.10.025","url":"https://dblp.org/rec/journals/cn/WuGSWL15"},
"url":"URL#4722712"
},
{
"@score":"1",
"@id":"4722715",
"info":{"authors":{"author":[{"@pid":"36/10100","text":"Dionysis Xenakis"},{"@pid":"21/4930","text":"Nikos I. Passas"},{"@pid":"49/5843","text":"Lazaros F. Merakos"},{"@pid":"18/466","text":"Christos V. Verikoukis"}]},"title":"Advanced mobility management for reduced interference and energy consumption in the two-tier LTE-Advanced network.","venue":"Comput. Networks","volume":"76","pages":"90-111","year":"2015","type":"Journal Articles","access":"closed","key":"journals/cn/XenakisPMV15","doi":"10.1016/J.COMNET.2014.10.024","ee":"https://doi.org/10.1016/j.comnet.2014.10.024","url":"https://dblp.org/rec/journals/cn/XenakisPMV15"},
"url":"URL#4722715"
}
]
}
}
}
