• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Automatic security policy enforcement in computer systems
Fulltext Access 35 Pages 2018
High performance continuous variable bandwidth digital filter design for hearing aid application
Fulltext Access 35 Pages 2018
Security architectures in constrained environments: A survey
Fulltext Access 35 Pages 2018
Artificial Bee Colony for optimization of cloud-ready and survivable elastic optical networks
Fulltext Access 35 Pages 2018
A data replication algorithm for groups of files in data grids
Fulltext Access 35 Pages 2018
Joint spectrum allocation and energy harvesting optimization in green powered heterogeneous cognitive radio networks
Fulltext Access 35 Pages 2018
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks
Fulltext Access 35 Pages 2018
Cooperative sensing for improved traffic efficiency: The highway field trial
Fulltext Access 35 Pages 2018
Queue management for two-user cognitive radio with delay-constrained primary user
Fulltext Access 35 Pages 2018
Characterisation and comparison of spatial patterns in urban systems: A case study of U.S. cities
Fulltext Access 35 Pages 2018
A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment
Fulltext Access 35 Pages 2018
Maximizing throughput for low duty-cycled sensor networks
Fulltext Access 35 Pages 2018
Improving network resources allocation in smart cities video surveillance
Fulltext Access 35 Pages 2018
Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds
Fulltext Access 35 Pages 2018
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
Fulltext Access 35 Pages 2018
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches
Fulltext Access 35 Pages 2018
A time synchronization protocol for large-scale distributed embedded systems with low-precision clocks and neighbor-to-neighbor communications
Fulltext Access 35 Pages 2018
Doubling algorithms for stationary distributions of fluid queues: A probabilistic interpretation
Fulltext Access 35 Pages 2018
A distributed multi-level model with dynamic replacement for the storage of smart edge computing
Fulltext Access 35 Pages 2018
Quality of software requirements specification in agile projects: A cross-case analysis of six companies
Fulltext Access 35 Pages 2018
Context-aware data quality assessment for big data
Fulltext Access 35 Pages 2018
Developing an integrated framework for using data mining techniques and ontology concepts for process improvement
Fulltext Access 35 Pages 2018
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned
Fulltext Access 36 Pages 2018
Agile values or plan-driven aspects: Which factor contributes more toward the success of data warehousing, business intelligence, and analytics project development?
Fulltext Access 36 Pages 2018
How does Facebook news use lead to actions in South Korea? The role of Facebook discussion network heterogeneity, political interest, and conflict avoidance in predicting political participation
Fulltext Access 36 Pages 2018
To use or not to use ad blockers? The roles of knowledge of ad blockers and attitude toward online advertising
Fulltext Access 36 Pages 2018
Efficient data perturbation for privacy preserving and accurate data stream mining
Fulltext Access 36 Pages 2018
Incentives-based preferences and mobility-aware task assignment in participatory sensing systems
Fulltext Access 36 Pages 2018
Combining heterogeneous anomaly detectors for improved software security
Fulltext Access 36 Pages 2018
Performance analysis of underlay two-way relay cooperation in cognitive radio networks with energy harvesting
Fulltext Access 36 Pages 2018
Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research
Fulltext Access 36 Pages 2018
Enforcing network policy in heterogeneous network function box environment
Fulltext Access 36 Pages 2018
Online machine learning algorithms to predict link quality in community wireless mesh networks
Fulltext Access 36 Pages 2018
Formal verification approaches and standards in the cloud computing: A comprehensive and systematic review
Fulltext Access 36 Pages 2018
Dynamic effects of customer experience levels on durable product satisfaction: Price and popularity moderation
Fulltext Access 36 Pages 2018
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges
Fulltext Access 36 Pages 2018
A survey of real-time approximate nearest neighbor query over streaming data for fog computing
Fulltext Access 36 Pages 2018
Attribute-based cloud storage with secure provenance over encrypted data
Fulltext Access 36 Pages 2018
Managing resources continuity from the edge to the cloud: Architecture and performance
Fulltext Access 36 Pages 2018
Fuzzy adaptive cognitive stimulation therapy generation for Alzheimer's sufferers: Towards a pervasive dementia care monitoring platform
Fulltext Access 36 Pages 2018
Tomogravity space based traffic matrix estimation in data center networks
Fulltext Access 36 Pages 2018
Measuring stream processing systems adaptability under dynamic workloads
Fulltext Access 36 Pages 2018
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining
Fulltext Access 36 Pages 2018
An event-extraction approach for business analysis from online Chinese news
Fulltext Access 36 Pages 2018
High-throughput Ant Colony Optimization on graphics processing units
Fulltext Access 36 Pages 2018
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices
Fulltext Access 36 Pages 2018
Examining the antecedents and consequences of mobile app engagement
Fulltext Access 37 Pages 2018
On minimizing total energy consumption in the scheduling of virtual machine reservations
Fulltext Access 37 Pages 2018
Prerequisites between learning objects: Automatic extraction based on a machine learning approach
Fulltext Access 37 Pages 2018
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network
Fulltext Access 37 Pages 2018
Process mining and hierarchical clustering to help intrusion alert visualization
Fulltext Access 37 Pages 2018
Optimization of live virtual machine migration in cloud computing: A survey and future directions
Fulltext Access 37 Pages 2018
A multi-layered performance analysis for cloud-based topic detection and tracking in Big Data applications
Fulltext Access 37 Pages 2018
An affective and Web 3.0-based learning environment for a programming language
Fulltext Access 37 Pages 2018
Efficient refactoring scheduling based on partial order reduction
Fulltext Access 37 Pages 2018
Multi-source fusion-based security detection method for heterogeneous networks
Fulltext Access 37 Pages 2018
Gamification for enhancing Web 2.0 based educational activities: The case of pre-service grade school teachers using educational Wiki pages
Fulltext Access 37 Pages 2018
Understanding social viewing through discussion network and emotion: A focus on South Korean presidential debates
Fulltext Access 37 Pages 2018
Quantum genetic algorithm based scheduler for batch of precedence constrained jobs on heterogeneous computing systems
Fulltext Access 37 Pages 2018
A new design and implementation of hardware accelerator for line detection
Fulltext Access 37 Pages 2018
Secure data deduplication using secret sharing schemes over cloud
Fulltext Access 37 Pages 2018
Outage probability of non-orthogonal multiple access with partial relay selection over Nakagami-m fading channels
Fulltext Access 37 Pages 2018
A smart artificial bee colony algorithm with distance-fitness-based neighbor search and its application
Fulltext Access 37 Pages 2018
Event-based sensor data exchange and fusion in the Internet of Things environments
Fulltext Access 37 Pages 2018
Drone networks: Communications, coordination, and sensing
Fulltext Access 37 Pages 2018
Dynamic allocation of power delivery paths in consolidated data centers based on adaptive UPS switching
Fulltext Access 37 Pages 2018
Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey
Fulltext Access 37 Pages 2018
Improving the performance of hybrid multiple access scheme in millimeter wave wireless personal area networks
Fulltext Access 37 Pages 2018
Fast media caching for geo-distributed data centers
Fulltext Access 37 Pages 2018
Fairness-constrained optimized time-window controllers for secondary-users with primary-user reliability guarantees
Fulltext Access 37 Pages 2018
A visual programming environment for introducing distributed computing to secondary education
Fulltext Access 37 Pages 2018
Realtime intrusion risk assessment model based on attack and service dependency graphs
Fulltext Access 37 Pages 2018
Reproducing dynamics related to an Internet of Things framework: A numerical and statistical approach
Fulltext Access 37 Pages 2018
A new risk-based authentication management model oriented on user's experience
Fulltext Access 37 Pages 2018
A hierarchical framework for ad inventory allocation in programmatic advertising markets
Fulltext Access 37 Pages 2018
Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems
Fulltext Access 37 Pages 2018
Towards the multi-request mechanism in pull-based peer-to-peer live streaming systems
Fulltext Access 37 Pages 2018
Structure aware resource estimation for effective scheduling and execution of data intensive workflows in cloud
Fulltext Access 37 Pages 2018
Does social media use really make people politically polarized? Direct and indirect effects of social media use on political polarization in South Korea
Fulltext Access 37 Pages 2018
Optimal deployment of heterogeneous sensor networks for a hybrid point and barrier coverage application
Fulltext Access 37 Pages 2018
Toward an IT investment decision support model for global enterprises
Fulltext Access 37 Pages 2018
Unstructured big data analytics for retrieving e-commerce logistics knowledge
Fulltext Access 37 Pages 2018
A survey on electronic coupons
Fulltext Access 37 Pages 2018
Drone delivery: Factors affecting the public's attitude and intention to adopt
Fulltext Access 38 Pages 2018
Subscription price and advertising space decisions for online content firms with reference effect
Fulltext Access 38 Pages 2018
Developing and using checklists to improve software effort estimation: A multi-case study
Fulltext Access 38 Pages 2018
Attitude estimation for indoor navigation and augmented reality with smartphones
Fulltext Access 38 Pages 2018
Data driven business rule generation based on fog computing
Fulltext Access 38 Pages 2018
A sparse representation based pansharpening method
Fulltext Access 38 Pages 2018
Low-power portable devices for metagenomics analysis: Fog computing makes bioinformatics ready for the Internet of Things
Fulltext Access 38 Pages 2018
Coordinated actor model of self-adaptive track-based traffic control systems
Fulltext Access 38 Pages 2018
A novel machine learning approach for scene text extraction
Fulltext Access 38 Pages 2018
Filtering irrelevant sequential data out of game session telemetry though similarity collapses
Fulltext Access 38 Pages 2018
Single-pass based efficient erasable pattern mining using list data structure on dynamic incremental databases
Fulltext Access 38 Pages 2018
Social collaborative service recommendation approach based on user's trust and domain-specific expertise
Fulltext Access 38 Pages 2018
Rethink data dissemination in opportunistic mobile networks with mutually exclusive requirement
Fulltext Access 38 Pages 2018
Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial
Fulltext Access 38 Pages 2018
An efficient data exchange mechanism for chained network functions
Fulltext Access 38 Pages 2018
Hierarchical load balancing as a service for federated cloud networks
Fulltext Access 38 Pages 2018
Drone Cellular Networks: Enhancing the Quality Of Experience of video streaming applications
Fulltext Access 38 Pages 2018
<< < 25 26 27 28 29 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities