• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Congestion control in cognitive radio networks with event-triggered sliding mode
Fulltext Access 21 Pages 2018
Towards a service-oriented cyber-physical systems of systems for smart city mobility applications
Fulltext Access 21 Pages 2018
Applying intelligent data traffic adaptation to high-performance multiple big data analytics platforms
Fulltext Access 21 Pages 2018
Distributed data-driven platform for urgent decision making in cardiological ambulance control
Fulltext Access 21 Pages 2018
Advance reservation access control using software-defined networking and tokens
Fulltext Access 21 Pages 2018
Saving lives using social media: Analysis of the role of twitter for personal blood donation requests and dissemination
Fulltext Access 21 Pages 2018
Analyzing the role of interfaces in enterprise service bus: A middleware epitome for service-oriented systems
Fulltext Access 21 Pages 2018
A privacy-preserving mobile application recommender system based on trust evaluation
Fulltext Access 21 Pages 2018
Movie recommendation based on bridging movie feature and user interest
Fulltext Access 21 Pages 2018
Perceived importance of agile requirements engineering practices - A survey
Fulltext Access 21 Pages 2018
An effective computational technique for taxonomic position of security vulnerability in software development
Fulltext Access 21 Pages 2018
A decentralized gossip based approach for data clustering in peer-to-peer networks
Fulltext Access 21 Pages 2018
Clustering routing based on mixed integer programming for heterogeneous wireless sensor networks
Fulltext Access 21 Pages 2018
Methodology of electrochemical capacitor quality control with fractional order model
Fulltext Access 21 Pages 2018
Crop yield forecasting using fuzzy logic and regression model
Fulltext Access 21 Pages 2018
Investigation of the characteristics of low-cost and lightweight horn array antennas with novel monolithic waveguide feeding networks
Fulltext Access 21 Pages 2018
Parallel algorithms for fitting Markov arrival processes
Fulltext Access 21 Pages 2018
Two new analog multipliers/dividers employing single current differencing buffer amplifier
Fulltext Access 21 Pages 2018
Miniaturized wideband dual linearly and circularly polarized printed square slot antenna for multiradio wireless systems
Fulltext Access 21 Pages 2018
Attack-aware resource planning and sparse monitor placement in optical networks
Fulltext Access 21 Pages 2018
A compact resistively-loaded dipole antenna fed by a triangular tapered transmission line for imaging applications
Fulltext Access 21 Pages 2018
Semiconductor metal oxide/polymer based fiber optic lossy mode resonance sensors: A contemporary study
Fulltext Access 21 Pages 2018
Cyclic frequency distinction and its application in modulation parameter estimation: An adaptive approach
Fulltext Access 21 Pages 2018
Design and evaluation of a new structure for fault-tolerance full-adder based on quantum-dot cellular automata
Fulltext Access 21 Pages 2018
Multi-objective embedding of software-defined virtual networks
Fulltext Access 21 Pages 2018
Joint load balancing and energy saving algorithm for virtual network embedding in infrastructure providers
Fulltext Access 21 Pages 2018
On optimal deployment of low power nodes for high frequency next generation wireless systems
Fulltext Access 21 Pages 2018
A refined mean field approximation of synchronous discrete-time population models
Fulltext Access 21 Pages 2018
Standards on cyber security assessment of smart grid
Fulltext Access 21 Pages 2018
A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis
Fulltext Access 21 Pages 2018
Adapting agile practices in university contexts
Fulltext Access 21 Pages 2018
Survey of resource allocation schemes and algorithms in spectrally-spatially flexible optical networking
Fulltext Access 21 Pages 2018
What role does self-efficacy play in developing cultural intelligence from social media usage?
Fulltext Access 21 Pages 2018
Correlating human traits and cyber security behavior intentions
Fulltext Access 21 Pages 2018
An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives
Fulltext Access 21 Pages 2018
Accentuating the renewable energy exploitation: Evaluation of flexibility options
Fulltext Access 21 Pages 2018
A multi-objective neural network trained with differential evolution for dynamic economic emission dispatch
Fulltext Access 21 Pages 2018
A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks
Fulltext Access 21 Pages 2018
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment
Fulltext Access 21 Pages 2018
Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection
Fulltext Access 21 Pages 2018
Towards thermal-aware Hadoop clusters
Fulltext Access 21 Pages 2018
A Cloud-based platform for the emulation of complex cybersecurity scenarios
Fulltext Access 21 Pages 2018
Decentralized self-adaptation for elastic Data Stream Processing
Fulltext Access 21 Pages 2018
Experimental and quantitative analysis of server power model for cloud data centers
Fulltext Access 21 Pages 2018
Automatic road detection system for an air-land amphibious car drone
Fulltext Access 21 Pages 2018
Symmetric graphs and interconnection networks
Fulltext Access 21 Pages 2018
Compact and miniaturized microstrip antenna based on fractal and metamaterial loads with reconfigurable qualification
Fulltext Access 21 Pages 2018
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city
Fulltext Access 21 Pages 2018
Game theory-based Security Vulnerability Quantification for Social Internet of Things
Fulltext Access 21 Pages 2018
The impact of security awarness on information technology professionals' behavior
Fulltext Access 21 Pages 2018
A high-available and location predictive data gathering scheme with mobile sinks for wireless sensor networks
Fulltext Access 21 Pages 2018
Partitioning big graph with respect to arbitrary proportions in a streaming manner
Fulltext Access 21 Pages 2018
Fault tolerant storage and data access optimization in data center networks
Fulltext Access 21 Pages 2018
Compositional execution semantics for business process verification
Fulltext Access 22 Pages 2018
Self-adaptation of service compositions through product line reconfiguration
Fulltext Access 22 Pages 2018
Artifact-based vs. human-perceived understandability and modifiability of refactored business processes: An experiment
Fulltext Access 22 Pages 2018
Twitter information for contributing to the strategic digital city: Towards citizens as co-managers
Fulltext Access 22 Pages 2018
Self-reconfigurable implementation for a switched beam smart antenna
Fulltext Access 22 Pages 2018
Heuristic approximation and computational algorithms for closed networks: A case study in open-pit mining
Fulltext Access 22 Pages 2018
Transient provisioning and performance evaluation for cloud computing platforms: A capacity value approach
Fulltext Access 22 Pages 2018
Computationally and energy efficient symbol-level precoding communications demonstrator
Fulltext Access 22 Pages 2018
Fully-differential current-mode higher order filters using all grounded passive elements
Fulltext Access 22 Pages 2018
Nano-networks communication architecture: Modeling and functions
Fulltext Access 22 Pages 2018
Modelling Software-Defined Networking: Software and hardware switches
Fulltext Access 22 Pages 2018
Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles
Fulltext Access 22 Pages 2018
Single active element implementation of fractional-order differentiators and integrators
Fulltext Access 22 Pages 2018
Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China
Fulltext Access 22 Pages 2018
A compact triple-band dual-element MIMO antenna with high port-to-port isolation for wireless applications
Fulltext Access 22 Pages 2018
An annulus sector grid aided energy-efficient multi-hop routing protocol for wireless sensor networks
Fulltext Access 22 Pages 2018
Resource efficiency, privacy and security by design: A first experience on enterprise servers and data storage products triggered by a policy process
Fulltext Access 22 Pages 2018
Study on the properties of the two-dimensional curved surface metamaterial
Fulltext Access 22 Pages 2018
Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud
Fulltext Access 22 Pages 2018
Towards end-to-end integrated optical packet network: Empirical analysis
Fulltext Access 22 Pages 2018
A Novel behavioral scoring model for estimating probability of default over time in peer-to-peer lending
Fulltext Access 22 Pages 2018
Social media, information presentation, consumer involvement, and cross-border adoption of pop culture products
Fulltext Access 22 Pages 2018
Congestion control in high-speed lossless data center networks: A survey
Fulltext Access 22 Pages 2018
Analyzing scientific context of researchers and communities by using complex network and semantic technologies
Fulltext Access 22 Pages 2018
Sentiment analysis of Chinese micro-blog text based on extended sentiment dictionary
Fulltext Access 22 Pages 2018
A unified face identification and resolution scheme using cloud computing in Internet of Things
Fulltext Access 22 Pages 2018
Eagle+: A fast incremental approach to automaton and table online updates for cloud services
Fulltext Access 22 Pages 2018
Software defined neighborhood area network for smart grid applications
Fulltext Access 22 Pages 2018
A framework for simulating large scale cloud infrastructures
Fulltext Access 22 Pages 2018
Subject-independent hand gesture recognition using normalization and machine learning algorithms
Fulltext Access 22 Pages 2018
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
Fulltext Access 22 Pages 2018
Hotspot-aware task-resource co-allocation for heterogeneous many-core networks-on-chip
Fulltext Access 22 Pages 2018
A push-pull network coding protocol for live peer-to-peer streaming
Fulltext Access 22 Pages 2018
Constructing routing structures for sensor data collection with dynamic traffic patterns
Fulltext Access 22 Pages 2018
Compact cross form antenna arrays intended for wideband two dimensional interferometric direction finding including the channel phase tracking error
Fulltext Access 22 Pages 2018
A novel voltage-mode universal filter composed of two terminal active devices
Fulltext Access 22 Pages 2018
Secure communication with a chaotic system owning logic element
Fulltext Access 22 Pages 2018
Optimized mobile sink based grid coverage-aware sensor deployment and link quality based routing in wireless sensor networks
Fulltext Access 22 Pages 2018
Electronically tunable high gain current-mode instrumentation amplifier
Fulltext Access 22 Pages 2018
An experimental case study on the relationship between workload and resource consumption in a commercial web server
Fulltext Access 22 Pages 2018
Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data
Fulltext Access 22 Pages 2018
Trust aware recommender system using swarm intelligence
Fulltext Access 23 Pages 2018
Recent advances on cooperative wireless localization and their application in inhomogeneous propagation environments
Fulltext Access 23 Pages 2018
On some end-user programming constructs and their understandability
Fulltext Access 23 Pages 2018
Formally modeling deceptive patches using a game-based approach
Fulltext Access 23 Pages 2018
A novel approach for optimal design of multilayer wideband microwave absorber using wind driven optimization technique
Fulltext Access 23 Pages 2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
Fulltext Access 23 Pages 2018
<< < 19 20 21 22 23 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities