• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Finding the best compromise in compiling compound loops to Verilog
Fulltext Access 13 Pages 2010
Robust fuzzy CPU utilization control for dynamic workloads
Fulltext Access 13 Pages 2010
TALISMAN MDE: Mixing MDE principles
Fulltext Access 13 Pages 2010
Using hybrid algorithm for Pareto efficient multi-objective test suite minimisation
Fulltext Access 13 Pages 2010
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Fulltext Access 13 Pages 2010
LESSON: A system for lecture notes searching and sharing over Internet
Fulltext Access 13 Pages 2010
Automated assembly of Internet-scale software systems involving autonomous agents
Fulltext Access 13 Pages 2010
Class movement and re-location: An empirical study of Java inheritance evolution
Fulltext Access 13 Pages 2010
Measuring behavioral dependency for improving change-proneness prediction in UML-based design models
Fulltext Access 13 Pages 2010
Formal specification of the variants and behavioural features of design patterns
Fulltext Access 13 Pages 2010
A new approach for component’s port modeling in software architecture
Fulltext Access 13 Pages 2010
Quantifying security risk level from CVSS estimates of frequency and impact
Fulltext Access 13 Pages 2010
CA-MPSoC: An automated design flow for predictable multi-processor architectures for multiple applications
Fulltext Access 13 Pages 2010
A novel adaptive steganography based on local complexity and human vision sensitivity
Fulltext Access 13 Pages 2010
Exploiting address compression and heterogeneous interconnects for efficient message management in tiled CMPs
Fulltext Access 13 Pages 2010
Embedded software debugging using virtual filesystem abstractions
Fulltext Access 13 Pages 2010
Buffer flush and address mapping scheme for flash memory solid-state disk
Fulltext Access 13 Pages 2010
Promoting the development of secure mobile agent applications
Fulltext Access 13 Pages 2010
Consistent query answers from virtually integrated XML data
Fulltext Access 13 Pages 2010
An empirical investigation into branch coverage for C programs using CUTE and AUSTIN
Fulltext Access 13 Pages 2010
Flexible and secure service discovery in ubiquitous computing
Fulltext Access 13 Pages 2010
A path-traceable query routing mechanism for search in unstructured peer-to-peer networks
Fulltext Access 13 Pages 2010
Wireless sensor network key management survey and taxonomy
Fulltext Access 13 Pages 2010
An authentication scheme for locating compromised sensor nodes in WSNs
Fulltext Access 13 Pages 2010
A framework for identity privacy in SIP
Fulltext Access 13 Pages 2010
Design and analysis of systems based on RF receivers with multiple carbon nanotube antennas
Fulltext Access 13 Pages 2010
Policy implications of market segmentation as a determinant of fixed-mobile service substitution: What it means for carriers and policy makers
Fulltext Access 13 Pages 2010
Priming, sense-making and help: Analysis of player behaviour in an immersive theatrical experience
Fulltext Access 13 Pages 2010
Insensitivity and stability of random-access networks
Fulltext Access 13 Pages 2010
An overview of routing methods in optical burst switching networks
Fulltext Access 13 Pages 2010
Topology and routing optimization for congestion minimization in optical wireless networks
Fulltext Access 13 Pages 2010
Introducing cognitive systems in the wireless B3G world: Motivations and basic engineering challenges
Fulltext Access 13 Pages 2010
Study of all-optical clock recovery performance by the primary and the secondary temporal Talbot effects in a second-order dispersive medium
Fulltext Access 13 Pages 2010
A nanoradio architecture for interacting nanonetworking tasks
Fulltext Access 13 Pages 2010
Synthetic protocols for nano sensor transmitting platforms using enzyme and DNA based computing
Fulltext Access 13 Pages 2010
Approximation for a two-class weighted fair queueing discipline
Fulltext Access 13 Pages 2010
Stochastic Petri nets with matrix exponentially distributed firing times
Fulltext Access 13 Pages 2010
Analysis of short term fairness and its impact on packet level performance
Fulltext Access 13 Pages 2010
Enabling portability in advanced information-centric services over structured peer-to-peer systems
Fulltext Access 13 Pages 2010
Bacteria-based communication in nanonetworks
Fulltext Access 13 Pages 2010
An input traffic allocation strategy and an efficient transmission technique for collisions-free WDM ring MANs
Fulltext Access 13 Pages 2010
Class prioritization and server dedication in queueing systems: Discrimination and fairness aspects
Fulltext Access 13 Pages 2010
Reliable data path design of VLIW processor cores with comprehensive error-coverage assessment
Fulltext Access 13 Pages 2010
Partial access conflict-relieving programmable address shuffler for parallel memory system in multi-core processor
Fulltext Access 13 Pages 2010
Branch target buffer design for embedded processors
Fulltext Access 13 Pages 2010
Motion estimation and CABAC VLSI co-processors for real-time high-quality H.264/AVC video coding
Fulltext Access 13 Pages 2010
Parameterized MAC unit generation for a scalable embedded DSP core
Fulltext Access 13 Pages 2010
Nonlinear signal–noise interactions in dispersion-managed links with various modulation formats
Fulltext Access 13 Pages 2010
McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks
Fulltext Access 13 Pages 2010
Software process improvement through the Lean Measurement (SPI-LEAM) method
Fulltext Access 13 Pages 2010
Some notes on the history of protocol engineering
Fulltext Access 13 Pages 2010
Identifying the capacity gains of multihop cellular networks
Fulltext Access 13 Pages 2010
A global security architecture for operated hybrid WLAN mesh networks
Fulltext Access 13 Pages 2010
Proxy caching for peer-to-peer live streaming
Fulltext Access 13 Pages 2010
The impact of network topology on the performance of MAP selection algorithms
Fulltext Access 13 Pages 2010
Design and implementation of the Node Identity Internetworking Architecture
Fulltext Access 13 Pages 2010
Secure peer sampling
Fulltext Access 13 Pages 2010
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks
Fulltext Access 13 Pages 2010
Strategies for adaptive smoothing and rebuffering via dynamic network calculus
Fulltext Access 13 Pages 2010
Two-link failure protection in WDM mesh networks with p-cycles
Fulltext Access 13 Pages 2010
Efficient staircase scheme with seamless channel transition mechanism
Fulltext Access 13 Pages 2010
Promoting effective service differentiation with Size-oriented Queue Management
Fulltext Access 13 Pages 2010
Characterizing and defending against divide-conquer-scanning worms
Fulltext Access 13 Pages 2010
Building an IP-based community wireless mesh network: Assessment of PACMAN as an IP address autoconfiguration protocol
Fulltext Access 13 Pages 2010
CCMAC: Coordinated cooperative MAC for wireless LANs
Fulltext Access 13 Pages 2010
Making the best of limited resources: Optimized differential sensing in cognitive PANs
Fulltext Access 13 Pages 2010
Access and service convergence over the mobile internet – A survey
Fulltext Access 13 Pages 2010
ABS: Adaptive buffer sizing for heterogeneous networks
Fulltext Access 13 Pages 2010
Impact of routing parameters on route diversity and path inflation
Fulltext Access 13 Pages 2010
An efficient dynamic-identity based signature scheme for secure network coding
Fulltext Access 13 Pages 2010
Deadline-based connection setup in wavelength-routed WDM networks
Fulltext Access 13 Pages 2010
Network virtualization in energy-efficient office environments
Fulltext Access 13 Pages 2010
The optimization of sensor relocation in wireless mobile sensor networks
Fulltext Access 13 Pages 2010
Performance analysis of large multicast packet switches with multiple input queues and gathered traffic
Fulltext Access 13 Pages 2010
On accuracy of region based localization algorithms for wireless sensor networks
Fulltext Access 13 Pages 2010
Iterative decision feedback equalizer with cyclic detection for DFT-S OFDM system
Fulltext Access 13 Pages 2010
Software engineering projects may fail before they are started: Post-mortem analysis of five cancelled projects
Fulltext Access 13 Pages 2010
Multi-level reconfigurable architectures in the switch model
Fulltext Access 13 Pages 2010
Towards real time implementation of reconstructive signal processing algorithms using systolic arrays coprocessors
Fulltext Access 13 Pages 2010
The growing need for on-scene triage of mobile devices
Fulltext Access 13 Pages 2010
Computing the correct Increment of Induction Pointers with application to loop unrolling
Fulltext Access 13 Pages 2010
ComboFTL: Improving performance and lifespan of MLC flash memory using SLC flash buffer
Fulltext Access 13 Pages 2010
Enabling inter-PMIPv6-domain handover with traffic distributors
Fulltext Access 13 Pages 2010
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
Fulltext Access 13 Pages 2010
A survey of video encryption algorithms
Fulltext Access 13 Pages 2010
Provably correct Java implementations of Spi Calculus security protocols specifications
Fulltext Access 13 Pages 2010
Thermal analysis and modeling of embedded processors
Fulltext Access 13 Pages 2010
Performance evaluation of fault tolerance techniques in grid computing system
Fulltext Access 13 Pages 2010
Using mobile beacons to locate sensors in obstructed environments
Fulltext Access 13 Pages 2010
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
Fulltext Access 13 Pages 2010
PKI-based trust management in inter-domain scenarios
Fulltext Access 13 Pages 2010
Certified electronic mail: Properties revisited
Fulltext Access 13 Pages 2010
A Personal Data Audit Method through Requirements Engineering
Fulltext Access 13 Pages 2010
A systematic review of security requirements engineering
Fulltext Access 13 Pages 2010
Power-based multi-cell call admission control scheme for wideband-CDMA systems
Fulltext Access 13 Pages 2010
Semantic web service composition testbed
Fulltext Access 13 Pages 2010
Opportunistic resource utilization networks—A new paradigm for specialized ad hoc networks
Fulltext Access 13 Pages 2010
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard
Fulltext Access 13 Pages 2010
Model and analysis of path compression for mobile Ad Hoc networks
Fulltext Access 13 Pages 2010
Performance measurement for mobile data streaming
Fulltext Access 13 Pages 2010
<< < 286 287 288 289 290 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities