• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Regions-of-interest discovering and predicting in smartphone environments
Fulltext Access 43 Pages 2018
A genetic algorithms-based hybrid recommender system of matrix factorization and neighborhood-based techniques
Fulltext Access 43 Pages 2018
Making sense of performance in in-memory computing frameworks for scientific data analysis: A case study of the spark system
Fulltext Access 43 Pages 2018
From ephemeral computing to deep bioinspired algorithms: New trends and applications
Fulltext Access 43 Pages 2018
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Fulltext Access 43 Pages 2018
Teaching high-performance service in a cluster computing course
Fulltext Access 43 Pages 2018
A benchmark approach and its toolkit for online scheduling of multiple deadline-constrained workflows in big-data processing systems
Fulltext Access 43 Pages 2018
Model checking real-time conditional commitment logic using transformation
Fulltext Access 43 Pages 2018
Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things
Fulltext Access 43 Pages 2018
A trust centric optimal service ranking approach for cloud service selection
Fulltext Access 43 Pages 2018
Early validation of system requirements and design through correctness-by-construction
Fulltext Access 43 Pages 2018
Parallelization of space-aware applications: Modeling and performance analysis
Fulltext Access 43 Pages 2018
High-level synthesis of on-chip multiprocessor architectures based on answer set programming
Fulltext Access 44 Pages 2018
Show your best self(ie): An exploratory study on selfie-related motivations and behavior in emerging adulthood
Fulltext Access 44 Pages 2018
Composition attack against social network data
Fulltext Access 44 Pages 2018
Taxonomy of mobile users' security awareness
Fulltext Access 44 Pages 2018
Who finds value in news comment communities? An analysis of the influence of individual user, perceived news site quality, and site type factors
Fulltext Access 44 Pages 2018
Technological innovation systems and IT industry sustainability in China: A case study of mobile system innovation
Fulltext Access 44 Pages 2018
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
Fulltext Access 44 Pages 2018
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things
Fulltext Access 44 Pages 2018
Risk analysis of Android applications: A user-centric solution
Fulltext Access 44 Pages 2018
Improving reusability of software libraries through usage pattern mining
Fulltext Access 44 Pages 2018
A survey of similarities in banking malware behaviours
Fulltext Access 44 Pages 2018
Survey on security in intra-body area network communication
Fulltext Access 44 Pages 2018
Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks
Fulltext Access 44 Pages 2018
A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud
Fulltext Access 44 Pages 2018
Supporting end users to control their smart home: design implications from a literature review and an empirical investigation
Fulltext Access 44 Pages 2018
A systematic review of fuzzing techniques
Fulltext Access 45 Pages 2018
Exploring the usefulness of unlabelled test cases in software fault localization
Fulltext Access 45 Pages 2018
A predator-prey model on the attacking behavior of malicious objects in wireless nanosensor networks
Fulltext Access 45 Pages 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
Fulltext Access 45 Pages 2018
An approach for optimized feature selection in large-scale software product lines
Fulltext Access 45 Pages 2018
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition
Fulltext Access 45 Pages 2018
Design and simulation of the emergent behavior of small drones swarming for distributed target localization
Fulltext Access 45 Pages 2018
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Fulltext Access 45 Pages 2018
An alignment-free cancelable fingerprint template for bio-cryptosystems
Fulltext Access 45 Pages 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
Fulltext Access 45 Pages 2018
A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues
Fulltext Access 45 Pages 2018
Gamification in software engineering education: A systematic mapping
Fulltext Access 45 Pages 2018
A systematic evaluation of cybersecurity metrics for dynamic networks
Fulltext Access 45 Pages 2018
A multi-target approach to estimate software vulnerability characteristics and severity scores
Fulltext Access 45 Pages 2018
Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment
Fulltext Access 45 Pages 2018
Optimization of decode-and-forward multihop full duplex relay networks under residual-self-interference
Fulltext Access 45 Pages 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems
Fulltext Access 45 Pages 2018
An approach to task-based parallel programming for undergraduate students
Fulltext Access 45 Pages 2018
Detection of app collusion potential using logic programming
Fulltext Access 46 Pages 2018
Cloud provider capacity augmentation through automated resource bartering
Fulltext Access 46 Pages 2018
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model
Fulltext Access 46 Pages 2018
Pattern graph tracking-based stock price prediction using big data
Fulltext Access 46 Pages 2018
A cloud-based remote sensing data production system
Fulltext Access 46 Pages 2018
Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat
Fulltext Access 46 Pages 2018
Lessoning travelers' motivating behavior for a growing phenomenon in Taiwan by an advanced hybrid object-oriented hierarchical model
Fulltext Access 46 Pages 2018
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs
Fulltext Access 46 Pages 2018
Hybrid online protocols for source location privacy in wireless sensor networks
Fulltext Access 46 Pages 2018
Secure provenance using an authenticated data structure approach
Fulltext Access 46 Pages 2018
Rate-based thermal, power, and co-location aware resource management for heterogeneous data centers
Fulltext Access 46 Pages 2018
Efficient energy management by exploiting retention state for self-powered nonvolatile processors
Fulltext Access 46 Pages 2018
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Fulltext Access 46 Pages 2018
Security-oriented opportunistic data forwarding in Mobile Social Networks
Fulltext Access 46 Pages 2018
Using behavioral features in tablet-based auditory emotion recognition studies
Fulltext Access 46 Pages 2018
Software patterns and requirements engineering activities in real-world settings: A systematic mapping study
Fulltext Access 46 Pages 2018
Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications
Fulltext Access 46 Pages 2018
Vehicular Social Networks: A survey
Fulltext Access 46 Pages 2018
Enriching sparse mobility information in Call Detail Records
Fulltext Access 47 Pages 2018
A comprehensive survey on internet outages
Fulltext Access 47 Pages 2018
Cooperative video caching scheme over software defined passive optical network
Fulltext Access 47 Pages 2018
Stop and forward: Opportunistic local information sharing under walking mobility
Fulltext Access 47 Pages 2018
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
Fulltext Access 47 Pages 2018
Harnessing the persuasive potential of data: The combinatory effects of data visualization and interactive narratives on obesity perceptions and policy attitudes
Fulltext Access 48 Pages 2018
Gender and age: Do they really moderate mobile tourism shopping behavior?
Fulltext Access 48 Pages 2018
Techno-unemployment: A framework for assessing the effects of information and communication technologies on work
Fulltext Access 48 Pages 2018
Adaptive composition in dynamic service environments
Fulltext Access 48 Pages 2018
Adaptive multicast streaming for videoconferences on software-defined networks
Fulltext Access 48 Pages 2018
Preparing the software engineer for a modern multi-core world
Fulltext Access 48 Pages 2018
Resource discovery for distributed computing systems: A comprehensive survey
Fulltext Access 48 Pages 2018
Real-time and energy aware opportunistic mobile crowdsensing framework based on people's connectivity habits
Fulltext Access 48 Pages 2018
Enabling robust and reliable transmission in Internet of Things with multiple gateways
Fulltext Access 48 Pages 2018
Secondary users selection and sparse narrow-band interference mitigation in cognitive radio networks
Fulltext Access 48 Pages 2018
Quantitative quality estimation of cloud-based streaming services
Fulltext Access 48 Pages 2018
Adaptive generation of challenging scenarios for testing and evaluation of autonomous vehicles
Fulltext Access 49 Pages 2018
Distributed nearest neighbor classification for large-scale multi-label data on spark
Fulltext Access 49 Pages 2018
Evaluation of transaction authentication methods for online banking
Fulltext Access 49 Pages 2018
Energy-aware backbone formation in military multilayer ad hoc networks
Fulltext Access 49 Pages 2018
Toward trust based protocols in a pervasive and mobile computing environment: A survey
Fulltext Access 49 Pages 2018
Building an automotive security assurance case using systematic security evaluations
Fulltext Access 49 Pages 2018
Do android developers neglect error handling? a maintenance-Centric study on the relationship between android abstractions and uncaught exceptions
Fulltext Access 49 Pages 2018
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
Fulltext Access 49 Pages 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
Fulltext Access 49 Pages 2018
Analytics in/for cloud-an interdependence: A review
Fulltext Access 49 Pages 2018
The impact of Internet of things implementation on firm performance
Fulltext Access 50 Pages 2018
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis
Fulltext Access 50 Pages 2018
The role of social support networks in proxy Internet use from the intergenerational solidarity perspective
Fulltext Access 50 Pages 2018
The impacts of techniques, programs and tests on automated program repair: An empirical study
Fulltext Access 50 Pages 2018
Cloud service evaluation method-based Multi-Criteria Decision-Making: A systematic literature review
Fulltext Access 50 Pages 2018
The role of Information and Communication Technologies in healthcare: taxonomies, perspectives, and challenges
Fulltext Access 50 Pages 2018
An ensemble learning based approach for impression fraud detection in mobile advertising
Fulltext Access 50 Pages 2018
Linking data and process perspectives for conformance analysis
Fulltext Access 50 Pages 2018
Secure key agreement protocols: Pure biometrics and cancelable biometrics
Fulltext Access 50 Pages 2018
Content sharing with mobility in an infrastructure-less environment
Fulltext Access 50 Pages 2018
A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks
Fulltext Access 50 Pages 2018
<< < 27 28 29 30 31 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities