• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

A security authorization scheme for smart home Internet of Things devices
Fulltext Access 25 Pages 2018
Learning Automata Clustering
Fulltext Access 25 Pages 2018
A novel approach on evolutionary dynamics analysis - A progress report
Fulltext Access 25 Pages 2018
Probabilistic class hierarchies for multiclass classification
Fulltext Access 25 Pages 2018
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
Fulltext Access 25 Pages 2018
A computer simulation of traffic flow with on-street parking and drivers' behaviour based on cellular automata and a multi-agent system
Fulltext Access 25 Pages 2018
Distributed coordination control of traffic network flow using adaptive genetic algorithm based on cloud computing
Fulltext Access 25 Pages 2018
Automatic assignment of integrators to pull requests: The importance of selecting appropriate attributes
Fulltext Access 25 Pages 2018
Enhanced dynamic programming approach for subunit modelling to handle segmentation and recognition ambiguities in sign language
Fulltext Access 25 Pages 2018
Social engineering in cybersecurity: The evolution of a concept
Fulltext Access 25 Pages 2018
A cross layer protocol for traffic management in Social Internet of Vehicles
Fulltext Access 25 Pages 2018
Uniformization: Basics, extensions and applications
Fulltext Access 25 Pages 2018
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
Fulltext Access 25 Pages 2018
A modeling front-end for seamless design and generation of context-aware Dynamically Reconfigurable Systems-on-Chip
Fulltext Access 25 Pages 2018
An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks
Fulltext Access 25 Pages 2018
A novel deep learning method for aircraft landing speed prediction based on cloud-based sensor data
Fulltext Access 25 Pages 2018
Virtualization-based evaluation of backhaul performance in vehicular applications
Fulltext Access 25 Pages 2018
Methodology, measurement and analysis of flow table update characteristics in hardware openflow switches
Fulltext Access 25 Pages 2018
A Continuous-Time Markov decision process-based resource allocation scheme in vehicular cloud for mobile video services
Fulltext Access 25 Pages 2018
Fractal based ultra-wideband antenna development for wireless personal area communication applications
Fulltext Access 25 Pages 2018
Resource allocation for cache-enabled cloud-based small cell networks
Fulltext Access 25 Pages 2018
A slot resonators based quintuple band-notched Y-shaped planar monopole ultra-wideband antenna
Fulltext Access 25 Pages 2018
Two thermocouples low power wireless sensors network
Fulltext Access 25 Pages 2018
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis
Fulltext Access 26 Pages 2018
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities
Fulltext Access 26 Pages 2018
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo
Fulltext Access 26 Pages 2018
The effects of an Adaptive and Distributed Transmission Power Control on the performance of energy harvesting sensor networks
Fulltext Access 26 Pages 2018
Energy efficient collaborative proactive routing protocol for Wireless Sensor Network
Fulltext Access 26 Pages 2018
The effectiveness of involving users in digital innovation: Measuring the impact of living labs
Fulltext Access 26 Pages 2018
Gradient based hybrid metaheuristics for robust tuning of power system stabilizers
Fulltext Access 26 Pages 2018
Anomaly behavior detection and reliability assessment of control systems based on association rules
Fulltext Access 26 Pages 2018
An Agent-based Spatial Urban Social Network Generator: A Case Study of Beijing, China
Fulltext Access 26 Pages 2018
An anatomy of requirements engineering in software startups using multi-vocal literature and case survey
Fulltext Access 26 Pages 2018
Multiple feature fusion for unconstrained palm print authentication
Fulltext Access 26 Pages 2018
Evaluating practitioner cyber-security attack graph configuration preferences
Fulltext Access 26 Pages 2018
Exploring the effects of specialist versus generalist embodied virtual agents in a multi-product category online store
Fulltext Access 26 Pages 2018
Evaluation of the Alzheimer's disease clinical stages under the optics of hybrid approaches in Verbal Decision Analysis
Fulltext Access 26 Pages 2018
Multi-objective scheduling for scientific workflow in multicloud environment
Fulltext Access 26 Pages 2018
Wireless powered cooperative communications with direct links over correlated channels
Fulltext Access 26 Pages 2018
Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing
Fulltext Access 26 Pages 2018
A survey on developing personalized content services in museums
Fulltext Access 26 Pages 2018
Memory resources aware run-time automated scheduling policy for multi-core systems
Fulltext Access 26 Pages 2018
A survey of model transformation design patterns in practice
Fulltext Access 26 Pages 2018
Multi-paradigm deception modeling for cyber defense
Fulltext Access 26 Pages 2018
Cascading Impact Assessment in a Critical Infrastructure System
Fulltext Access 26 Pages 2018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Fulltext Access 26 Pages 2018
Privacy preserving cloud data auditing with efficient key update
Fulltext Access 26 Pages 2018
Integration of smart grid technologies in stochastic multi-objective unit commitment: An economic emission analysis
Fulltext Access 26 Pages 2018
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing
Fulltext Access 26 Pages 2018
Incremental encoding for erasure-coded cross-datacenters cloud storage
Fulltext Access 26 Pages 2018
A component based unified architecture for utility service in cloud
Fulltext Access 26 Pages 2018
An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea
Fulltext Access 26 Pages 2018
Internet of agents framework for connected vehicles: A case study on distributed traffic control system
Fulltext Access 26 Pages 2018
Low complexity resource allocation in the relay channels with energy harvesting transmitters
Fulltext Access 26 Pages 2018
A new congestion control mechanism for transport protocol of cognitive radio sensor networks
Fulltext Access 26 Pages 2018
Analog active filter design using a multi objective genetic algorithm
Fulltext Access 26 Pages 2018
Connectivity analysis of underground sensors in wireless underground sensor networks
Fulltext Access 26 Pages 2018
Efficient error detection in soft data fusion for cooperative spectrum sensing
Fulltext Access 26 Pages 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
Fulltext Access 27 Pages 2018
In-memory big data analytics under space constraints using dynamic programming
Fulltext Access 27 Pages 2018
Arcades: A deep model for adaptive decision making in voice controlled smart-home
Fulltext Access 27 Pages 2018
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing
Fulltext Access 27 Pages 2018
Smartphone based approximate localization using user highlighted texts from images
Fulltext Access 27 Pages 2018
Efficient algorithms for physical layer security in two-way relay systems
Fulltext Access 27 Pages 2018
Switch-and-stay combining for energy harvesting relaying systems
Fulltext Access 27 Pages 2018
Performance analysis of underlay cooperative cognitive full-duplex networks with energy-harvesting relay
Fulltext Access 27 Pages 2018
Chaos-based robust method of zero-watermarking for medical signals
Fulltext Access 27 Pages 2018
Privacy-preserving image retrieval for mobile devices with deep features on the cloud
Fulltext Access 27 Pages 2018
Analysis of the essential factors for the adoption of mobile learning in higher education: A case study of students of the University of Technology
Fulltext Access 27 Pages 2018
Smartphone application personality and its relationship to personalities of smartphone users and social capital accrued through use of smartphone social applications
Fulltext Access 27 Pages 2018
Bridging the gap between social media and behavioral brand loyalty
Fulltext Access 27 Pages 2018
News, search and stock co-movement: Investigating information diffusion in the financial market
Fulltext Access 27 Pages 2018
Do reviews from friends and the crowd affect online consumer posting behaviour differently?
Fulltext Access 27 Pages 2018
Alternating server with non-zero switch-over times and opposite-queue threshold-based switching policy
Fulltext Access 27 Pages 2018
A new adaptive trust and reputation model for Mobile Agent Systems
Fulltext Access 27 Pages 2018
Dynamic workload patterns prediction for proactive auto-scaling of web applications
Fulltext Access 27 Pages 2018
Ranking online consumer reviews
Fulltext Access 27 Pages 2018
Is mobile payment still relevant in the fintech era?
Fulltext Access 27 Pages 2018
Verifying temporal properties of programs: A parallel approach
Fulltext Access 27 Pages 2018
Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals
Fulltext Access 27 Pages 2018
Prediction-based protocols for vehicular Ad Hoc Networks: Survey and taxonomy
Fulltext Access 27 Pages 2018
Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment
Fulltext Access 27 Pages 2018
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting
Fulltext Access 27 Pages 2018
Cybersecurity education: Evolution of the discipline and analysis of master programs
Fulltext Access 27 Pages 2018
Sampling-based selection-decimation deployment approach for large-scale wireless sensor networks
Fulltext Access 27 Pages 2018
Improving risk assessment model of cyber security using fuzzy logic inference system
Fulltext Access 27 Pages 2018
Harnessing sliding-window execution semantics for parallel stream processing
Fulltext Access 27 Pages 2018
Malware classification using self organising feature maps and machine activity data
Fulltext Access 27 Pages 2018
A survey study on Internet of Things resource management
Fulltext Access 27 Pages 2018
Efficient data association to targets for tracking in passive wireless sensor networks
Fulltext Access 27 Pages 2018
A scalable algorithm for simulating the structural plasticity of the brain
Fulltext Access 27 Pages 2018
An efficient scheduling scheme for mobile charger in on-demand wireless rechargeable sensor networks
Fulltext Access 27 Pages 2018
Multi-authority fine-grained access control with accountability and its application in cloud
Fulltext Access 27 Pages 2018
Analysis of publication activity of computational science society in 2001-2017 using topic modelling and graph theory
Fulltext Access 27 Pages 2018
Scalable and secure access control policy update for outsourced big data
Fulltext Access 27 Pages 2018
A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks
Fulltext Access 27 Pages 2018
Cascadable independently and electronically tunable voltage-mode universal filter with grounded passive components
Fulltext Access 27 Pages 2018
Change impact analysis for evolving configuration decisions in product line use case models
Fulltext Access 27 Pages 2018
An effective approach for software project effort and duration estimation with machine learning algorithms
Fulltext Access 27 Pages 2018
Hora: Architecture-aware online failure prediction
Fulltext Access 27 Pages 2018
<< < 21 22 23 24 25 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities