• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks
Fulltext Access 19 Pages 2013
Evidence of software inspection on feature specification for software product lines
Fulltext Access 19 Pages 2013
Measuring the impact of changes to the complexity and coupling properties of automotive software systems
Fulltext Access 19 Pages 2013
RCDA: Architecting as a risk- and cost management discipline
Fulltext Access 19 Pages 2013
MDE software process lines in small companies
Fulltext Access 19 Pages 2013
Communities of Web service registries: Construction and management
Fulltext Access 19 Pages 2013
A novel approach to evaluate software vulnerability prioritization
Fulltext Access 19 Pages 2013
A mixed-method approach for the empirical evaluation of the issue-based variability modeling
Fulltext Access 19 Pages 2013
From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies
Fulltext Access 19 Pages 2013
Modular analysis and modelling of risk scenarios with dependencies
Fulltext Access 19 Pages 2013
A direct method for optimal VLSI realization of deeply nested n-D loop problems
Fulltext Access 19 Pages 2013
Fault tolerant system design and SEU injection based testing
Fulltext Access 19 Pages 2013
Product-forms in batch networks: Approximation and asymptotics
Fulltext Access 19 Pages 2013
On the numerical solution of Kronecker-based infinite level-dependent QBD processes
Fulltext Access 19 Pages 2013
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications
Fulltext Access 19 Pages 2013
A new self-diagnosing approach based on petri nets and correlation graphs for fault management in wireless sensor networks
Fulltext Access 19 Pages 2013
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration
Fulltext Access 19 Pages 2013
Evaluation studies of software testing research in Brazil and in the world: A survey of two premier software engineering conferences
Fulltext Access 19 Pages 2013
Efficient coupled PHY and MAC use of physical Bursts in WiMAX/IEEE 802.16e networks
Fulltext Access 19 Pages 2013
A general scalable and accurate decentralized level monitoring method for large-scale dynamic service provision in hybrid clouds
Fulltext Access 19 Pages 2013
Modeling and performance analysis of large scale IaaS Clouds
Fulltext Access 19 Pages 2013
An exploration of technical debt
Fulltext Access 19 Pages 2013
Managing context data for diverse operating spaces
Fulltext Access 19 Pages 2013
Formal approach to agent-based dynamic reconfiguration in Networks-On-Chip
Fulltext Access 20 Pages 2013
Digital image forgery detection using passive techniques: A survey
Fulltext Access 20 Pages 2013
Towards end-to-end network resilience
Fulltext Access 20 Pages 2013
What are the roles of software product managers? An empirical investigation
Fulltext Access 20 Pages 2013
Dynamic distribution of robot control components under hard realtime constraints – Modeling, experimental results and practical considerations
Fulltext Access 20 Pages 2013
Software generated device exception for more intensive device-related software testing: An industrial field study
Fulltext Access 20 Pages 2013
Mode switch timing analysis for component-based multi-mode systems
Fulltext Access 20 Pages 2013
Constrained frequent pattern mining on univariate uncertain data
Fulltext Access 20 Pages 2013
Supporting concept location through identifier parsing and ontology extraction
Fulltext Access 20 Pages 2013
Supporting end-to-end quality of service properties in OMG data distribution service publish/subscribe middleware over wide area networks
Fulltext Access 20 Pages 2013
Scaled control in the QED regime
Fulltext Access 20 Pages 2013
On the interaction between TCP-like sources and throughput-efficient scheduling policies
Fulltext Access 20 Pages 2013
From big smartphone data to worldwide research: The Mobile Data Challenge
Fulltext Access 20 Pages 2013
Application and analysis of multidimensional negative surveys in participatory sensing applications
Fulltext Access 20 Pages 2013
Design and analysis of heterogeneous nanoscale on-chip communication networks
Fulltext Access 20 Pages 2013
A comparative experimental study of software rejuvenation overhead
Fulltext Access 20 Pages 2013
On the scalability of the random pairwise key predistribution scheme: Gradual deployment and key ring sizes
Fulltext Access 20 Pages 2013
Formal verification of context and situation models in pervasive computing
Fulltext Access 20 Pages 2013
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks
Fulltext Access 20 Pages 2013
A content-based publish/subscribe framework for large-scale content delivery
Fulltext Access 20 Pages 2013
Adaptive Delay-Aware Energy Efficient TDM-PON
Fulltext Access 20 Pages 2013
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning
Fulltext Access 20 Pages 2013
GOAL: A parsimonious geographic routing protocol for large scale sensor networks
Fulltext Access 20 Pages 2013
Geo-casting of queries combined with coverage area reporting for wireless sensor networks
Fulltext Access 20 Pages 2013
CoCONet: A collision-free container-based core optical network
Fulltext Access 20 Pages 2013
Performance analysis and improvement of PR-SCTP for small messages
Fulltext Access 20 Pages 2013
A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks
Fulltext Access 20 Pages 2013
H: A component-based specification language for heterogeneous applications
Fulltext Access 20 Pages 2013
On design and performance evaluation of an integrated SIP and HCoP-B architecture for nested network mobility
Fulltext Access 20 Pages 2013
A new adaptive filtering subband algorithm for two-channel acoustic noise reduction and speech enhancement
Fulltext Access 20 Pages 2013
HybridNN: An accurate and scalable network location service based on the inframetric model
Fulltext Access 20 Pages 2013
Timed protocol insecurity problem is NP-complete
Fulltext Access 20 Pages 2013
Using interconnected risk maps to assess the threats faced by electricity infrastructures
Fulltext Access 20 Pages 2013
Website features that gave rise to social commerce: a historical analysis
Fulltext Access 20 Pages 2013
Defeating line-noise CAPTCHAs with multiple quadratic snakes
Fulltext Access 20 Pages 2013
Scheduling parameter sweep workflow in the Grid based on resource competition
Fulltext Access 20 Pages 2013
Delegate the smartphone user? Security awareness in smartphone platforms
Fulltext Access 20 Pages 2013
On the optimality of cooperative intrusion detection for resource constrained wireless networks
Fulltext Access 20 Pages 2013
A two phased service oriented Broker for replica selection in data grids
Fulltext Access 20 Pages 2013
Providing multiple hard latency and throughput guarantees for packet switching networks on chip
Fulltext Access 20 Pages 2013
Discovering periodic patterns of nodal encounters in mobile networks
Fulltext Access 21 Pages 2013
Cross-layer design and analysis of WSN-based mobile target detection systems
Fulltext Access 21 Pages 2013
Seeing through black boxes: Tracking transactions through queues under monitoring resource constraints
Fulltext Access 21 Pages 2013
The feedback-capacity tradeoff for opportunistic beamforming under optimal user selection
Fulltext Access 21 Pages 2013
Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments
Fulltext Access 21 Pages 2013
Network utility maximization over partially observable Markovian channels
Fulltext Access 21 Pages 2013
Autonomic load balancing of flow monitors
Fulltext Access 21 Pages 2013
SLA-controlled interconnection charging in next generation networks
Fulltext Access 21 Pages 2013
Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet
Fulltext Access 21 Pages 2013
Incrementally upgradable data center architecture using hyperbolic tessellations
Fulltext Access 21 Pages 2013
DistressNet: A disaster response system providing constant availability cloud-like services
Fulltext Access 21 Pages 2013
Evaluating the perceived and estimated quality in use of Web 2.0 applications
Fulltext Access 21 Pages 2013
Security as a theoretical attribute construct
Fulltext Access 21 Pages 2013
Does decision documentation help junior designers rationalize their decisions? A comparative multiple-case study
Fulltext Access 21 Pages 2013
Assessing the genuineness of events in runtime monitoring of cyber systems
Fulltext Access 21 Pages 2013
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
Fulltext Access 21 Pages 2013
A cloud-based intelligent TV program recommendation system
Fulltext Access 21 Pages 2013
DeSyRe: On-demand system reliability
Fulltext Access 21 Pages 2013
A study of cyclic dependencies on defect profile of software components
Fulltext Access 21 Pages 2013
A new MAC scheme specifically suited for real-time industrial communication based on IEEE 802.11e
Fulltext Access 21 Pages 2013
Agile requirements prioritization in large-scale outsourced system projects: An empirical study
Fulltext Access 21 Pages 2013
A formal role-based access control model for security policies in multi-domain mobile networks
Fulltext Access 21 Pages 2013
Enhancing IDS performance through comprehensive alert post-processing
Fulltext Access 21 Pages 2013
Common weaving approach in mainstream languages for software security hardening
Fulltext Access 21 Pages 2013
Automatic optimisation of system architectures using EAST-ADL
Fulltext Access 21 Pages 2013
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network
Fulltext Access 21 Pages 2013
On the integration of model-driven design and dynamic assertion-based verification for embedded software
Fulltext Access 21 Pages 2013
SHADuDT: Secure hypervisor-based anomaly detection using danger theory
Fulltext Access 21 Pages 2013
Towards secure mobile cloud computing: A survey
Fulltext Access 22 Pages 2013
Active topology inference using network coding
Fulltext Access 22 Pages 2013
Management of stateful firewall misconfiguration
Fulltext Access 22 Pages 2013
Simulation of molecular signaling in blood vessels: Software design and application to atherogenesis
Fulltext Access 22 Pages 2013
Data center demand response: Avoiding the coincident peak via workload shifting and local generation
Fulltext Access 22 Pages 2013
Interference suppression for the LTE uplink
Fulltext Access 22 Pages 2013
CAMPUS: A middleware for automated context-aware adaptation decision making at run time
Fulltext Access 22 Pages 2013
Load time code validation for mobile phone Java Cards
Fulltext Access 22 Pages 2013
Situation-based testing for pervasive computing environments
Fulltext Access 22 Pages 2013
<< < 223 224 225 226 227 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities