• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Rapid functional modelling and simulation of coarse grained reconfigurable array architectures
Fulltext Access 9 Pages 2011
Improving rate allocation for ephemeral traffic using a second-order algorithm
Fulltext Access 9 Pages 2011
A mutual-healing key distribution scheme in wireless sensor networks
Fulltext Access 9 Pages 2011
Capacity and interference aware link scheduling with channel assignment in wireless mesh networks
Fulltext Access 9 Pages 2011
Boosting adaptivity of fault-tolerant scheduling for real-time tasks with service requirements on clusters
Fulltext Access 9 Pages 2011
An analytical model of broadcast in QoS-aware wormhole-routed NoCs
Fulltext Access 9 Pages 2011
Provably secure and efficient authentication techniques for the global mobility network
Fulltext Access 9 Pages 2011
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes
Fulltext Access 9 Pages 2011
Function point measurement from Web application source code based on screen transitions and database accesses
Fulltext Access 9 Pages 2011
A secure fragile watermarking scheme based on chaos-and-hamming code
Fulltext Access 9 Pages 2011
Exact schedulability tests for real-time scheduling of periodic tasks on unrelated multiprocessor platforms
Fulltext Access 9 Pages 2011
Reliable and energy optimized WSN design for a train application
Fulltext Access 9 Pages 2011
A passive image authentication scheme for detecting region-duplication forgery with rotation
Fulltext Access 9 Pages 2011
A novel 3D streaming protocol supported multi-mode display
Fulltext Access 9 Pages 2011
A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle
Fulltext Access 9 Pages 2011
IDFC: A new approach to control bifurcation in TCP/RED
Fulltext Access 9 Pages 2011
A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors
Fulltext Access 9 Pages 2011
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Fulltext Access 9 Pages 2011
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
Fulltext Access 9 Pages 2011
Delegatable secret handshake scheme
Fulltext Access 9 Pages 2011
A fast, GPU based, dictionary attack to OpenPGP secret keyrings
Fulltext Access 9 Pages 2011
Is there convergence in the field of UI generation?
Fulltext Access 9 Pages 2011
Transactional memories for multi-processor FPGA platforms
Fulltext Access 9 Pages 2011
Secure service orchestration in open networks
Fulltext Access 9 Pages 2011
Temporal partitioning of data flow graph for dynamically reconfigurable architecture
Fulltext Access 9 Pages 2011
Context aware service provisioning in mobile grid
Fulltext Access 9 Pages 2011
Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system
Fulltext Access 9 Pages 2011
Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification
Fulltext Access 9 Pages 2011
Joint admission and power control for quality-of-service in the wireless downlink
Fulltext Access 9 Pages 2011
Improved flooding of broadcast messages using extended multipoint relaying
Fulltext Access 9 Pages 2011
Proxy encryption based secure multicast in wireless mesh networks
Fulltext Access 9 Pages 2011
Improving security in WMNs with reputation systems and self-organizing maps
Fulltext Access 9 Pages 2011
Business process analysis and simulation for the RFID and EPCglobal Network enabled supply chain: A proof-of-concept approach
Fulltext Access 9 Pages 2011
State of the art of frameworks and middleware for facilitating mobile and ubiquitous learning development
Fulltext Access 9 Pages 2011
Strongly unforgeable proxy signature scheme secure in the standard model
Fulltext Access 9 Pages 2011
Exploiting dynamic micro-architecture usage in gate sizing
Fulltext Access 9 Pages 2011
Application of NSGA-II to feature selection for facial expression recognition
Fulltext Access 9 Pages 2011
Possibility of an embedded system for ultrasound-based measurement of the distances to two target objects
Fulltext Access 9 Pages 2011
Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks
Fulltext Access 9 Pages 2011
A novel algorithm for feature selection using Harmony Search and its application for non-technical losses detection
Fulltext Access 9 Pages 2011
On the value distributions of Walsh spectrums of quadratic Plateaued functions
Fulltext Access 9 Pages 2011
A user friendly authentication scheme with anonymity for wireless communications
Fulltext Access 9 Pages 2011
Multi-focus image fusion for visual sensor networks in DCT domain
Fulltext Access 9 Pages 2011
Results from a normative dependency analysis of geographic information standards
Fulltext Access 9 Pages 2011
Efficient access control labeling scheme for secure XML query processing
Fulltext Access 9 Pages 2011
An extended matrix encoding algorithm for steganography of high embedding efficiency
Fulltext Access 9 Pages 2011
Optimized QoS-aware replica placement heuristics and applications in astronomy data grid
Fulltext Access 9 Pages 2011
BSN: An automatic generation algorithm of social network data
Fulltext Access 9 Pages 2011
On a security model of conjunctive keyword search over encrypted relational database
Fulltext Access 9 Pages 2011
Design of embedded TCAM based longest prefix match search engine
Fulltext Access 9 Pages 2011
A fuzzy predictive redundancy system for fault-tolerance of x-by-wire systems
Fulltext Access 9 Pages 2011
Design of a performance enhanced and power reduced dual-crossbar Network-on-Chip (NoC) architecture
Fulltext Access 9 Pages 2011
A TDM slot allocation flow based on multipath routing in NoCs
Fulltext Access 9 Pages 2011
Low-power subthreshold to above threshold level shifters in 90 nm and 65 nm process
Fulltext Access 9 Pages 2011
Fuzzy identity based signature with applications to biometric authentication
Fulltext Access 9 Pages 2011
Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
Fulltext Access 9 Pages 2011
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications
Fulltext Access 9 Pages 2011
Effective macroblock layer rate control algorithm for H.264/AVC
Fulltext Access 9 Pages 2011
Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux
Fulltext Access 9 Pages 2011
DSP instrument for transient monitoring
Fulltext Access 9 Pages 2011
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
Fulltext Access 9 Pages 2011
A web-based sensor network system with distributed data processing approach via web application
Fulltext Access 9 Pages 2011
IEEE 802.21: Media independence beyond handover
Fulltext Access 9 Pages 2011
User acceptance of wireless technology in organizations: A comparison of alternative models
Fulltext Access 9 Pages 2011
When does a workflow complete?
Fulltext Access 9 Pages 2011
Integrating service discovery technologies in OSGi platform
Fulltext Access 9 Pages 2011
The antecedent factors on trust and commitment in supply chain relationships
Fulltext Access 9 Pages 2011
Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks
Fulltext Access 9 Pages 2011
An on-chip instruction cache design with one-bit tag for low-power embedded systems
Fulltext Access 10 Pages 2011
A comparison of deterministic and probabilistic methods for indoor localization
Fulltext Access 10 Pages 2011
An efficient CRT-RSA algorithm secure against power and fault attacks
Fulltext Access 10 Pages 2011
Variable assignment and instruction scheduling for processor with multi-module memory
Fulltext Access 10 Pages 2011
Universal bridge interface for DVP-compatible image sensors
Fulltext Access 10 Pages 2011
Adjusting Fuzzy Similarity Functions for use with standard data mining tools
Fulltext Access 10 Pages 2011
Zero-laxity based real-time multiprocessor scheduling
Fulltext Access 10 Pages 2011
A topology control protocol based on eligibility and efficiency metrics
Fulltext Access 10 Pages 2011
Design of a Java spatial extension for relational databases
Fulltext Access 10 Pages 2011
Interactive conditional proxy re-encryption with fine grain policy
Fulltext Access 10 Pages 2011
Explaining website effectiveness: The hedonic–utilitarian dual mediation hypothesis
Fulltext Access 10 Pages 2011
Security analysis of the ADS-B implementation in the next generation air transportation system
Fulltext Access 10 Pages 2011
Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure
Fulltext Access 10 Pages 2011
A novel electronic cash system with trustee-based anonymity revocation from pairing
Fulltext Access 10 Pages 2011
Reputation inflation detection in a Chinese C2C market
Fulltext Access 10 Pages 2011
Do males and females differ in how they perceive and elaborate on agent-based recommendations in Internet-based selling?
Fulltext Access 10 Pages 2011
MUCS: A model for ubiquitous commerce support
Fulltext Access 10 Pages 2011
The challenge for multichannel services: Cross-channel free-riding behavior
Fulltext Access 10 Pages 2011
Designing utility-based recommender systems for e-commerce: Evaluation of preference-elicitation methods
Fulltext Access 10 Pages 2011
The role of psychological traits and social factors in using new mobile communication services
Fulltext Access 10 Pages 2011
Mining competitor relationships from online news: A network-based approach
Fulltext Access 10 Pages 2011
Communication-efficient leader election in crash–recovery systems
Fulltext Access 10 Pages 2011
An energy-efficient MAC protocol with downlink traffic scheduling strategy in IEEE 802.11 infrastructure WLANs
Fulltext Access 10 Pages 2011
Shape analysis for power signal cryptanalysis on secure components
Fulltext Access 10 Pages 2011
A data hiding scheme using the varieties of pixel-value differencing in multimedia images
Fulltext Access 10 Pages 2011
An exploration of defensive deception in industrial communication networks
Fulltext Access 10 Pages 2011
A comparative study on simulation vs. real time deployment in wireless sensor networks
Fulltext Access 10 Pages 2011
Identity-based strong designated verifier signature revisited
Fulltext Access 10 Pages 2011
Practitioner perceptions of Open Source software in the embedded systems area
Fulltext Access 10 Pages 2011
Efficient file fuzz testing using automated analysis of binary file format
Fulltext Access 10 Pages 2011
New heuristic algorithms for energy aware application mapping and routing on mesh-based NoCs
Fulltext Access 10 Pages 2011
Modelling and analysis of pipelined circuit switching in interconnection networks with bursty traffic and hot-spot destinations
Fulltext Access 10 Pages 2011
<< < 257 258 259 260 261 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities