• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Comparing approaches to analyze refactoring activity on software repositories
Fulltext Access 17 Pages 2013
Avoiding semantic and temporal gaps in developing software intensive systems
Fulltext Access 17 Pages 2013
Relevance, benefits, and problems of software modelling and model driven techniques—A survey in the Italian industry
Fulltext Access 17 Pages 2013
SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones
Fulltext Access 17 Pages 2013
An FPGA based high performance optical flow hardware design for computer vision applications
Fulltext Access 17 Pages 2013
Domain-Specific Modeling Languages to improve framework instantiation
Fulltext Access 17 Pages 2013
Enriching MATLAB with aspect-oriented features for developing embedded systems
Fulltext Access 17 Pages 2013
Design space exploration of thermal-aware many-core systems
Fulltext Access 17 Pages 2013
PASES: An energy-aware design space exploration framework for wireless sensor networks
Fulltext Access 17 Pages 2013
A development and verification framework for the SegBus platform
Fulltext Access 17 Pages 2013
Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing
Fulltext Access 17 Pages 2013
An intrusion detection and prevention system in cloud computing: A systematic review
Fulltext Access 17 Pages 2013
Federated broker system for pervasive context provisioning
Fulltext Access 17 Pages 2013
A mapping study to investigate component-based software system metrics
Fulltext Access 17 Pages 2013
A scoping study on the 25 years of research into software testing in Brazil and an outlook on the future of the area
Fulltext Access 17 Pages 2013
New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm
Fulltext Access 17 Pages 2013
Oblivious and fair server-aided two-party computation
Fulltext Access 17 Pages 2013
Semantic analysis of role mining results and shadowed roles detection
Fulltext Access 17 Pages 2013
On-scene triage open source forensic tool chests: Are they effective?
Fulltext Access 17 Pages 2013
A survey on application mapping strategies for Network-on-Chip design
Fulltext Access 17 Pages 2013
Towards a multiple-ISA embedded system
Fulltext Access 17 Pages 2013
Reducing cache and TLB power by exploiting memory region and privilege level semantics
Fulltext Access 17 Pages 2013
Enforcing dynamic write privileges in data outsourcing
Fulltext Access 17 Pages 2013
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic
Fulltext Access 17 Pages 2013
Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation
Fulltext Access 17 Pages 2013
Quality assessment of the packet transport of peer-to-peer video traffic in high-speed networks
Fulltext Access 17 Pages 2013
Model and comparative analysis of reduced-complexity receiver designs for the LTE-advanced SC-FDMA uplink
Fulltext Access 17 Pages 2013
Data interpolation for participatory sensing systems
Fulltext Access 17 Pages 2013
An equation-based Heap Sizing Rule
Fulltext Access 17 Pages 2013
A comprehensive approach to optimal software rejuvenation
Fulltext Access 17 Pages 2013
Secure communications over opportunistic-relay channels
Fulltext Access 17 Pages 2013
Towards an optimal transmission of SDUs in IEEE 802.16e WiMAX systems
Fulltext Access 17 Pages 2013
New assembly techniques and fast reservation protocols for optical burst switched networks based on traffic prediction
Fulltext Access 17 Pages 2013
Departure process analysis of the multi-type MMAP[K]/PH[K]/1 FCFS queue
Fulltext Access 17 Pages 2013
Mobile social networking middleware: A survey
Fulltext Access 17 Pages 2013
Visual analysis of social networks in space and time using smartphone logs
Fulltext Access 17 Pages 2013
Analysis of a versatile batch-service queueing model with correlation in the arrival process
Fulltext Access 17 Pages 2013
Numerical analysis of rational processes beyond Markov chains
Fulltext Access 17 Pages 2013
A vision-based blind spot warning system for daytime and nighttime driver assistance
Fulltext Access 17 Pages 2013
Controlling a complete hardware synthesis toolchain with LARA aspects
Fulltext Access 17 Pages 2013
Compiling Scilab to high performance embedded multicore systems
Fulltext Access 17 Pages 2013
Towards an early software estimation using log-linear regression and a multilayer perceptron model
Fulltext Access 17 Pages 2013
A content-aware bridging service for publish/subscribe environments
Fulltext Access 17 Pages 2013
Refactoring legacy AJAX applications to improve the efficiency of the data exchange component
Fulltext Access 17 Pages 2013
A simulation model for strategic management process of software projects
Fulltext Access 17 Pages 2013
On the reliability of mapping studies in software engineering
Fulltext Access 17 Pages 2013
Hybrid multi-attribute QoS optimization in component based software systems
Fulltext Access 17 Pages 2013
Model-based cache-aware dispatching of object-oriented software for multicore systems
Fulltext Access 17 Pages 2013
Minimizing test-point allocation to improve diagnosability in business process models
Fulltext Access 17 Pages 2013
Securing color information of an image by concealing the color palette
Fulltext Access 17 Pages 2013
Clustering and power management for virtual MIMO communications in wireless sensor networks
Fulltext Access 17 Pages 2013
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
Fulltext Access 17 Pages 2013
Enabling efficient reprogramming through reduction of executable modules in networked embedded systems
Fulltext Access 17 Pages 2013
A dual scheme for compression and restoration of sequentially transmitted images over Wireless Sensor Networks
Fulltext Access 17 Pages 2013
Efficient rate allocation, routing and channel assignment in wireless mesh networks supporting dynamic traffic flows
Fulltext Access 17 Pages 2013
Energy minimization by exploiting data redundancy in real-time wireless sensor networks
Fulltext Access 17 Pages 2013
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
Fulltext Access 17 Pages 2013
Passive wake-up radios: From devices to applications
Fulltext Access 17 Pages 2013
A dual-mode energy efficient encryption protocol for wireless sensor networks
Fulltext Access 17 Pages 2013
Impacts of user-selfishness on cooperative content caching in social wireless networks
Fulltext Access 17 Pages 2013
An exploration of aggregation convergecast scheduling
Fulltext Access 17 Pages 2013
Admission control on multipath routing in 802.11-based wireless mesh networks
Fulltext Access 17 Pages 2013
Polarization-based cooperative directional MAC protocol for ad hoc networks
Fulltext Access 17 Pages 2013
Design novel weighted rating of multiple attributes scheme to enhance handoff efficiency in heterogeneous wireless networks
Fulltext Access 17 Pages 2013
Energy monitoring in residential spaces with audio sensor nodes: TinyEARS
Fulltext Access 17 Pages 2013
Parallel Bayesian inference of range and reflectance from LaDAR profiles
Fulltext Access 17 Pages 2013
Comparisons of air traffic control implementations on an associative processor with a MIMD and consequences for parallel computing
Fulltext Access 17 Pages 2013
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
Fulltext Access 17 Pages 2013
Continuous data aggregation and capacity in probabilistic wireless sensor networks
Fulltext Access 17 Pages 2013
Locality principle revisited: A probability-based quantitative approach
Fulltext Access 17 Pages 2013
ProFID: Practical frequent items discovery in peer-to-peer networks
Fulltext Access 17 Pages 2013
Efficient service cache management in mobile P2P networks
Fulltext Access 17 Pages 2013
Digital droplets: Microsoft SkyDrive forensic data remnants
Fulltext Access 17 Pages 2013
Model checking grid security
Fulltext Access 17 Pages 2013
Resource requirement prediction using clone detection technique
Fulltext Access 17 Pages 2013
A study of unpredictability in fault-tolerant middleware
Fulltext Access 17 Pages 2013
CP2: Cryptographic privacy protection framework for online social networks
Fulltext Access 17 Pages 2013
Overhead and underground MIMO low voltage broadband over power lines networks and EMI regulations: Towards greener capacity performances
Fulltext Access 17 Pages 2013
Energy efficient and QoS aware routing protocol for Clustered Wireless Sensor Network
Fulltext Access 17 Pages 2013
Zigbee-based Internet of Things in 3D Terrains
Fulltext Access 17 Pages 2013
Interference-aware cooperative QoS routing in multi-hop wireless networks
Fulltext Access 17 Pages 2013
Co-operative user identity verification using an Authentication Aura
Fulltext Access 17 Pages 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES
Fulltext Access 17 Pages 2013
Hierarchy-oriented modeling of enterprise architecture using reference-model of open distributed processing
Fulltext Access 17 Pages 2013
Statistical speech translation system based on voice recognition optimization using multimodal sources of knowledge and characteristics vectors
Fulltext Access 17 Pages 2013
Optimal opportunistic routing and network coding for bidirectional wireless flows
Fulltext Access 17 Pages 2013
FaRNet: Fast recognition of high-dimensional patterns from big network traffic data
Fulltext Access 17 Pages 2013
Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks
Fulltext Access 17 Pages 2013
Flubber: Two-level disk scheduling in virtualized environment
Fulltext Access 17 Pages 2013
Femtocell based green power consumption methods for mobile network
Fulltext Access 17 Pages 2013
An efficient critical protection scheme for intra-domain routing using link characteristics
Fulltext Access 17 Pages 2013
Estimation of the available bandwidth ratio of a remote link or path segments
Fulltext Access 17 Pages 2013
Crisis management using MAS-based wireless sensor networks
Fulltext Access 17 Pages 2013
Energy efficiency of femtocell deployment in combined wireless/optical access networks
Fulltext Access 17 Pages 2013
Mean–variance relationship of the number of flows in traffic aggregation and its application to traffic management
Fulltext Access 17 Pages 2013
Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects
Fulltext Access 17 Pages 2013
Integration of the OAuth and Web Service family security standards
Fulltext Access 17 Pages 2013
Stochastic modelling of peer-assisted VoD streaming in managed networks
Fulltext Access 17 Pages 2013
Towards a bipartite graph modeling of the internet topology
Fulltext Access 17 Pages 2013
Self-∗ in Multimedia Communication Overlays
Fulltext Access 17 Pages 2013
<< < 221 222 223 224 225 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities