The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 26,
Issue 1
Volume 25,
Issue 4
Volume 25,
Issue 3
Volume 25,
Issue 2
Volume 25,
Issue 1
Volume 24,
Issue 3
Volume 24,
Issue 2
Volume 24,
Issue 1
Volume 23,
Issue 4
Volume 23,
Issue 3
Volume 23,
Issue 2
Volume 23,
Issue 1
Volume 22,
Issue 4
Volume 22,
Issue 3
Volume 22,
Issue 2
Volume 22,
Issue 1
Volume 21,
Issue 4
Volume 21,
Issue 3
Volume 21,
Issue 2
Volume 21,
Issue 1
Volume 20,
Issue 4
Volume 20,
Issue 2
Volume 20,
Issue 1
Volume 19,
Issue 4
Volume 19,
Issue 3
Volume 19,
Issue 2
Volume 19,
Issue 1
Volume 18,
Issue 4
Volume 18,
Issue 3
Volume 18,
Issue 2
Volume 18,
Issue 1
Volume 17,
Issue 4
Volume 17,
Issue 3
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 2
Volume 16,
Issue 1
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 1
Volume 3,
Issue 4
Volume 3,
Issue 3
Volume 3,
Issue 2
Volume 3,
Issue 1
>
Table of contents
2
A survey of security issues in mobile ad hoc and sensor networks
Djenouri, D.
/ Khelladi, L.
/ Badache, A.N.
et al.
| 2005
30
Handover management architectures in integrated WLAN/cellular networks
Lampropoulos, G.
/ Passas, N.
/ Merakos, L.
et al.
| 2005
46
Using game theory to analyze wireless ad hoc networks
Srivastava, V.
/ Neel, J.
/ Mackenzie, A.B.
et al.
| 2005
58
Charging and pricing challenges for 3G systems
Ezziane, Z.
et al.
| 2005