• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Energy optimization of Application-Specific Instruction-Set Processors by using hardware accelerators in semicustom ICs technology
Fulltext Access 11 Pages 2012
3D thermal-aware floorplanner using a MILP approximation
Fulltext Access 11 Pages 2012
Area-time efficient multi-modulus adders and their applications
Fulltext Access 11 Pages 2012
Ontology driven bee's foraging approach based self adaptive online recommendation system
Fulltext Access 12 Pages 2012
Test coverage optimization for large code problems
Fulltext Access 12 Pages 2012
Further observation on proxy re-encryption with keyword search
Fulltext Access 12 Pages 2012
A history-based cost-cognizant test case prioritization technique in regression testing
Fulltext Access 12 Pages 2012
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Fulltext Access 12 Pages 2012
Investigating intentional distortions in software cost estimation – An exploratory study
Fulltext Access 12 Pages 2012
Grindstone4Spam: An optimization toolkit for boosting e-mail classification
Fulltext Access 12 Pages 2012
Concept vector for semantic similarity and relatedness based on WordNet structure
Fulltext Access 12 Pages 2012
Masquerade attacks based on user's profile
Fulltext Access 12 Pages 2012
Nearest neighbor selection for iteratively kNN imputation
Fulltext Access 12 Pages 2012
Performance analysis of SCOOP programs
Fulltext Access 12 Pages 2012
VLSI-DSP based real time solution of DSC–SRI for an ultrasound system
Fulltext Access 12 Pages 2012
NetStage/DPR: A self-reconfiguring platform for active and passive network security operations
Fulltext Access 12 Pages 2012
Resource-bounded multicore emulation using Beefarm
Fulltext Access 12 Pages 2012
Security analysis of image cryptosystems only or partially based on a chaotic permutation
Fulltext Access 12 Pages 2012
Debugging applications created by a Domain Specific Language: The IPAC case
Fulltext Access 12 Pages 2012
Free and Open Source Software versus Internet content filtering and censorship: A case study
Fulltext Access 12 Pages 2012
Intelligent reversible watermarking in integer wavelet domain for medical images
Fulltext Access 12 Pages 2012
Improving test efficiency through system test prioritization
Fulltext Access 12 Pages 2012
An adaptive model-free resource and power management approach for multi-tier cloud environments
Fulltext Access 12 Pages 2012
From proprietary to open source—Growing an open source ecosystem
Fulltext Access 12 Pages 2012
A longitudinal case study of an emerging software ecosystem: Implications for practice and theory
Fulltext Access 12 Pages 2012
Applying security policies and service level agreement to IaaS service model to enhance security and transition
Fulltext Access 12 Pages 2012
Image data field for homogeneous region based segmentation
Fulltext Access 12 Pages 2012
Hierarchical hybrid control for improving comprehensive performance in smart power system
Fulltext Access 12 Pages 2012
An experimental comparison of different real-time schedulers on multicore systems
Fulltext Access 12 Pages 2012
The influence of SPI on business success in software SMEs: An empirical study
Fulltext Access 12 Pages 2012
On the relationship between comment update practices and Software Bugs
Fulltext Access 12 Pages 2012
Performance analysis of sleep mode mechanisms in the presence of bidirectional traffic
Fulltext Access 12 Pages 2012
Optimal configuration of Energy-Efficient Ethernet
Fulltext Access 12 Pages 2012
Ant colony based self-adaptive energy saving routing for energy efficient Internet
Fulltext Access 12 Pages 2012
How do we encourage an egoist to act socially in an ad hoc mobile network?
Fulltext Access 12 Pages 2012
Overflow management with multipart packets
Fulltext Access 12 Pages 2012
A novel neural network and backtracking based protection coordination scheme for distribution system with distributed generation
Fulltext Access 12 Pages 2012
A strategy to simultaneously tune power system stabilizers
Fulltext Access 12 Pages 2012
Maximum power point tracking of partially shaded solar PV system using modified Fibonacci search method with fuzzy controller
Fulltext Access 12 Pages 2012
A signer-independent Arabic Sign Language recognition system using face detection, geometric features, and a Hidden Markov Model
Fulltext Access 12 Pages 2012
Energy management strategy for fuel cell/battery/ultracapacitor hybrid vehicle based on fuzzy logic
Fulltext Access 12 Pages 2012
NSGA-II with local search for a multi-objective reactive power compensation problem
Fulltext Access 12 Pages 2012
Transient performance improvement of grid connected hydro system using distributed generation and capacitive energy storage unit
Fulltext Access 12 Pages 2012
Comparison of different robust control methods in design of decentralized UPFC controllers
Fulltext Access 12 Pages 2012
An application specific instruction set processor based implementation for signal detection in multiple antenna systems
Fulltext Access 12 Pages 2012
Rapid exploration of integrated scheduling and module selection in high level synthesis for application specific processor design
Fulltext Access 12 Pages 2012
Versatile design of shared vector coprocessors for multicores
Fulltext Access 12 Pages 2012
An efficient routing methodology to tolerate static and dynamic faults in 2-D mesh networks-on-chip
Fulltext Access 12 Pages 2012
Accelerating FPGA-based evolution of wavelet transform filters by optimized task scheduling
Fulltext Access 12 Pages 2012
Design automation of cellular neural networks for data fusion applications
Fulltext Access 12 Pages 2012
Balancing electricity bill and performance in server farms with setup costs
Fulltext Access 12 Pages 2012
Dynamic RAT selection for multiple calls in heterogeneous wireless networks using group decision-making technique
Fulltext Access 12 Pages 2012
An efficient key management scheme for content access control for linear hierarchies
Fulltext Access 12 Pages 2012
Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels
Fulltext Access 12 Pages 2012
Efficient HMAC-based secure communication for VANETs
Fulltext Access 12 Pages 2012
On the spatial properties of internet routes
Fulltext Access 12 Pages 2012
The Spy Element Method – A universal approach to complex computing on manycore processors
Fulltext Access 12 Pages 2012
Towards governance on noise between municipality and terminal operator by the use of simulation modelling
Fulltext Access 12 Pages 2012
A time series approach for clustering mass spectrometry data
Fulltext Access 12 Pages 2012
OPTIMIS: A holistic approach to cloud service provisioning
Fulltext Access 12 Pages 2012
Overlay network resource allocation using a decentralized market-based approach
Fulltext Access 12 Pages 2012
Layered Green Performance Indicators
Fulltext Access 12 Pages 2012
Energy accounting for shared virtualized environments under DVFS using PMC-based power models
Fulltext Access 12 Pages 2012
Optimal Hop Extended MAC protocol for wireless sensor networks
Fulltext Access 12 Pages 2012
CyberGuarder: A virtualization security assurance architecture for green cloud computing
Fulltext Access 12 Pages 2012
A service oriented architecture for decision support systems in environmental crisis management
Fulltext Access 12 Pages 2012
A probabilistic task scheduling method for grid environments
Fulltext Access 12 Pages 2012
High level QoS-driven model for Grid applications in a simulated environment
Fulltext Access 12 Pages 2012
Combining explicit admission control and congestion control for predictable data transfers in grids
Fulltext Access 12 Pages 2012
A GridWay-based autonomic network-aware metascheduler
Fulltext Access 12 Pages 2012
An autonomic framework for enhancing the quality of data grid services
Fulltext Access 12 Pages 2012
Scheduling real-time DAGs in heterogeneous clusters by combining imprecise computations and bin packing techniques for the exploitation of schedule holes
Fulltext Access 12 Pages 2012
Adaptive parallel job scheduling with resource admissible allocation on two-level hierarchical grids
Fulltext Access 12 Pages 2012
Impact of pricing schemes on a market for Software-as-a-Service and perpetual software
Fulltext Access 12 Pages 2012
Service level agreement as a complementary currency in peer-to-peer markets
Fulltext Access 12 Pages 2012
A business-driven decomposition methodology for role mining
Fulltext Access 12 Pages 2012
A state estimator including conventional and synchronized phasor measurements
Fulltext Access 12 Pages 2012
On the self-similarity of 1/fβ sequences synthesized by recursive filtering
Fulltext Access 12 Pages 2012
DTBR: A dynamic thermal-balance routing algorithm for Network-on-Chip
Fulltext Access 12 Pages 2012
Automatic mapping of parallel applications on multicore architectures using the Servet benchmark suite
Fulltext Access 12 Pages 2012
Partially persistent B-trees with constant worst-case update time
Fulltext Access 12 Pages 2012
Research on the immune strategy for the polluted file propagation in structured P2P networks
Fulltext Access 12 Pages 2012
Spectral efficiency of cognitive radio networks under interference constraint and QoS guarantees
Fulltext Access 12 Pages 2012
Towards reliable self-clustering Mobile Ad Hoc Networks
Fulltext Access 12 Pages 2012
Jamming aware routing for MHWN with dynamic measurement
Fulltext Access 12 Pages 2012
HACS: A novel cost aware paradigm promising fault tolerance on mesh-based network on chip architecture
Fulltext Access 12 Pages 2012
Local Upsampling Fourier Transform for accurate 2D/3D image registration
Fulltext Access 12 Pages 2012
A systematic gradient-based method for the computation of fingerprint’s orientation field
Fulltext Access 12 Pages 2012
New method for scheduling heterogeneous multi-installment systems
Fulltext Access 12 Pages 2012
A standard language for service delivery: Enabling understanding among stakeholders
Fulltext Access 12 Pages 2012
Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol
Fulltext Access 12 Pages 2012
Churn prediction in telecom using Random Forest and PSO based data balancing in combination with various feature selection strategies
Fulltext Access 12 Pages 2012
FPGA implementation and performance study of spectrum sensing based on entropy estimation using cyclic features
Fulltext Access 12 Pages 2012
A new scheme for covert communication via 3G encoded speech
Fulltext Access 12 Pages 2012
Power-aware system-on-chip test scheduling using enhanced rectangle packing algorithm
Fulltext Access 12 Pages 2012
On the impact of adaptive RED in IP networks transporting H.264/MPEG-4 AVC video streams
Fulltext Access 12 Pages 2012
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks
Fulltext Access 12 Pages 2012
Heuristic algorithms for two-dimensional uplink burst construction in IEEE 802.16 networks
Fulltext Access 12 Pages 2012
An ontology for the harmonization of multiple standards and models
Fulltext Access 12 Pages 2012
Virtio network paravirtualization driver: Implementation and performance of a de-facto standard
Fulltext Access 12 Pages 2012
<< < 237 238 239 240 241 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities