• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

SmartK: Smart cards in operating systems at kernel level
Fulltext Access 12 Pages 2013
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks
Fulltext Access 12 Pages 2013
Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach
Fulltext Access 12 Pages 2013
A high performance link layer mobility management strategy for professional private broadband networks
Fulltext Access 12 Pages 2013
Self adaptive routing for dynamic spectrum access in cognitive radio networks
Fulltext Access 12 Pages 2013
Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks
Fulltext Access 12 Pages 2013
An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers
Fulltext Access 12 Pages 2013
Cooperative scheduling mechanism for large-scale peer-to-peer computing systems
Fulltext Access 12 Pages 2013
Behavioral classification and detection of malware through HTTP user agent anomalies
Fulltext Access 12 Pages 2013
Secure computations on non-integer values with applications to privacy-preserving sequence analysis
Fulltext Access 12 Pages 2013
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications
Fulltext Access 12 Pages 2013
Dynamic key management in wireless sensor networks: A survey
Fulltext Access 12 Pages 2013
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems
Fulltext Access 12 Pages 2013
A novel service-oriented intelligent seamless migration algorithm and application for pervasive computing environments
Fulltext Access 12 Pages 2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
Fulltext Access 12 Pages 2013
Analyses of two end-user software vulnerability exposure metrics (extended version)
Fulltext Access 12 Pages 2013
A Machine Learning-based Triage methodology for automated categorization of digital media
Fulltext Access 12 Pages 2013
Efficient image duplicated region detection model using sequential block clustering
Fulltext Access 12 Pages 2013
An empirical comparison of data recovered from mobile forensic toolkits
Fulltext Access 12 Pages 2013
Hierarchical neural networks based prediction and control of dynamic reconfiguration for multilevel embedded systems
Fulltext Access 12 Pages 2013
A template system for the efficient compilation of domain abstractions onto reconfigurable computers
Fulltext Access 12 Pages 2013
Apple-CORE: Harnessing general-purpose many-cores with hardware concurrency management
Fulltext Access 12 Pages 2013
A formal study on topology and floorplan characteristics of mesh and torus-based optical networks-on-chip
Fulltext Access 12 Pages 2013
A hyperscalar dual-core architecture for embedded systems
Fulltext Access 12 Pages 2013
Scalable matrix decompositions with multiple cores on FPGAs
Fulltext Access 12 Pages 2013
Design and benchmarking of an ASIC with five SHA-3 finalist candidates
Fulltext Access 12 Pages 2013
Automated design debugging in a testbench-based verification environment
Fulltext Access 12 Pages 2013
Considering the effect of process variations during the ISA extension design flow
Fulltext Access 12 Pages 2013
An environment for (re)configuration and execution management of heterogeneous flexible radio platforms
Fulltext Access 12 Pages 2013
Design of a novel differential on-chip wave-pipelined serial interconnect with surfing
Fulltext Access 12 Pages 2013
RFID based access control protection scheme for SRAM FPGA IP cores
Fulltext Access 12 Pages 2013
Server-aided signatures verification secure against collusion attack
Fulltext Access 12 Pages 2013
Traffic engineered NoC for streaming applications
Fulltext Access 12 Pages 2013
A multi-tier phishing detection and filtering approach
Fulltext Access 12 Pages 2013
Sensing task assignment via sensor selection for maximum target coverage in WSNs
Fulltext Access 12 Pages 2013
Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks
Fulltext Access 12 Pages 2013
On the use of a full information feedback to stabilize RED
Fulltext Access 12 Pages 2013
Research on social relations cognitive model of mobile nodes in Internet of Things
Fulltext Access 12 Pages 2013
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks
Fulltext Access 12 Pages 2013
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
Fulltext Access 12 Pages 2013
Combination of data replication and scheduling algorithm for improving data availability in Data Grids
Fulltext Access 12 Pages 2013
G-Hadoop: MapReduce across distributed data centers for data-intensive computing
Fulltext Access 12 Pages 2013
Locally divergence-free central discontinuous Galerkin methods for ideal MHD equations
Fulltext Access 12 Pages 2013
A discontinuous Galerkin method for solutions of the Euler equations on Cartesian grids with embedded geometries
Fulltext Access 12 Pages 2013
Central schemes for the modified Buckley–Leverett equation
Fulltext Access 12 Pages 2013
Flexible load distribution for hybrid distributed virtual environments
Fulltext Access 12 Pages 2013
Cooperative stalking of transient nomadic resources on overlay networks
Fulltext Access 12 Pages 2013
A distributed scheduling framework based on selfish autonomous agents for federated cloud environments
Fulltext Access 12 Pages 2013
A classification of file placement and replication methods on grids
Fulltext Access 12 Pages 2013
A unified framework for the deployment, exposure and access of HPC applications as services in clouds
Fulltext Access 12 Pages 2013
Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems
Fulltext Access 12 Pages 2013
Fast computation of the performance evaluation of biometric systems: Application to multibiometrics
Fulltext Access 12 Pages 2013
Bacterial foraging based hyper-heuristic for resource scheduling in grid computing
Fulltext Access 12 Pages 2013
A hierarchical vision processing architecture oriented to 3D integration of smart camera chips
Fulltext Access 12 Pages 2013
Network performance isolation for latency-sensitive cloud applications
Fulltext Access 12 Pages 2013
A framework for ranking of cloud computing services
Fulltext Access 12 Pages 2013
Creating standardized products for electronic markets
Fulltext Access 12 Pages 2013
Characterizing spot price dynamics in public cloud environments
Fulltext Access 12 Pages 2013
Developing front-end Web 2.0 technologies to access services, content and things in the future Internet
Fulltext Access 12 Pages 2013
Decreasing power consumption with energy efficient data aware strategies
Fulltext Access 12 Pages 2013
Scheduling linear chain streaming applications on heterogeneous systems with failures
Fulltext Access 12 Pages 2013
Decentralized orchestration of data-centric workflows in Cloud environments
Fulltext Access 12 Pages 2013
HELIO: Discovery and analysis of data in heliophysics
Fulltext Access 12 Pages 2013
Distributed, application-level monitoring for heterogeneous clouds using stream processing
Fulltext Access 12 Pages 2013
Characterizing workflow-based activity on a production e-infrastructure using provenance data
Fulltext Access 12 Pages 2013
Towards commoditized smart-camera design
Fulltext Access 12 Pages 2013
Differential malware forensics
Fulltext Access 12 Pages 2013
Group-based protocol and mobility model for VANETs to offer internet access
Fulltext Access 12 Pages 2013
JPEG steganography detection with Benford's Law
Fulltext Access 12 Pages 2013
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Fulltext Access 12 Pages 2013
DigLA – A Digsby log analysis tool to identify forensic artifacts
Fulltext Access 13 Pages 2013
Approaches to the classification of high entropy file fragments
Fulltext Access 13 Pages 2013
Wireless Sensor Network transport protocol: A critical review
Fulltext Access 13 Pages 2013
A novel classification model for data theft detection using advanced pattern mining
Fulltext Access 13 Pages 2013
Benefits of using parallelized non-progressive network coding
Fulltext Access 13 Pages 2013
Exploiting reference images for image splicing verification
Fulltext Access 13 Pages 2013
A lightweight framework for secure life-logging in smart environments
Fulltext Access 13 Pages 2013
Secret image sharing using grayscale payload decomposition and irreversible image steganography
Fulltext Access 13 Pages 2013
Applicability of position-based routing for VANET in highways and urban environment
Fulltext Access 13 Pages 2013
A practical and robust approach to coping with large volumes of data submitted for digital forensic examination
Fulltext Access 13 Pages 2013
Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network
Fulltext Access 13 Pages 2013
Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models
Fulltext Access 13 Pages 2013
On supporting rapid exploration of memory hierarchies onto FPGAs
Fulltext Access 13 Pages 2013
Portable wireless-networking protocol evaluation
Fulltext Access 13 Pages 2013
All-IP communication between wireless sensor networks and IPv6 networks based on location information
Fulltext Access 13 Pages 2013
Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications
Fulltext Access 13 Pages 2013
Performance evaluation of user applications in the ITS scenario: An analytical assessment of the NeMHIP
Fulltext Access 13 Pages 2013
Privacy preserving broadcast message authentication protocol for VANETs
Fulltext Access 13 Pages 2013
A maturity model for the Spanish software industry based on ISO standards
Fulltext Access 13 Pages 2013
A network accountability based verification mechanism for detecting inter-domain routing path inconsistency
Fulltext Access 13 Pages 2013
Cloud storage forensics: ownCloud as a case study
Fulltext Access 13 Pages 2013
Research on an active knowledge push service based on collaborative intent capture
Fulltext Access 13 Pages 2013
Hadamard transform based adaptive visible/invisible watermarking scheme for digital images
Fulltext Access 13 Pages 2013
Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation
Fulltext Access 13 Pages 2013
Position-based routing in vehicular networks: A survey
Fulltext Access 13 Pages 2013
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies
Fulltext Access 13 Pages 2013
Message transmission and key establishment: General equality for weak and strong capacities
Fulltext Access 13 Pages 2013
On the security of certain e-communication types: Risks, user awareness and recommendations
Fulltext Access 13 Pages 2013
Re-examining the performance bottleneck in a NIDS with detailed profiling
Fulltext Access 13 Pages 2013
On a family of run length limited, block decodable codes to prevent payload-induced jitter in Controller Area Networks
Fulltext Access 13 Pages 2013
<< < 213 214 215 216 217 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities