• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards
Fulltext Access 11 Pages 2009
Using age registers for a simple load–store queue filtering
Fulltext Access 11 Pages 2009
Performance evaluation study for QoS-aware triple play services over entry-level xDSL connections
Fulltext Access 11 Pages 2009
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks
Fulltext Access 11 Pages 2009
ML-Chord: A multi-layered P2P resource sharing model
Fulltext Access 11 Pages 2009
Robust performance testing for digital forensic tools
Fulltext Access 11 Pages 2009
Reducing threats from flawed security APIs: The banking PIN case
Fulltext Access 11 Pages 2009
Self-efficacy in information security: Its influence on end users' information security practice behavior
Fulltext Access 11 Pages 2009
Issues and challenges in securing VoIP
Fulltext Access 11 Pages 2009
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses
Fulltext Access 11 Pages 2009
Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users
Fulltext Access 11 Pages 2009
Introducing undergraduate students to simulation of semiconductor doping techniques
Fulltext Access 11 Pages 2009
Techniques and algorithms for access control list optimization
Fulltext Access 11 Pages 2009
Validation and verification of computer forensic software tools—Searching Function
Fulltext Access 11 Pages 2009
Broadband system to increase bitrate in train communication networks
Fulltext Access 11 Pages 2009
Business to business interoperability: A current review of XML data integration standards
Fulltext Access 11 Pages 2009
Huffman-based join-exit-tree scheme for contributory key management
Fulltext Access 11 Pages 2009
Anomaly-based network intrusion detection: Techniques, systems and challenges
Fulltext Access 11 Pages 2009
On the development of an internetwork-centric defense for scanning worms
Fulltext Access 11 Pages 2009
An action refinement operator for E-LOTOS with true concurrency
Fulltext Access 11 Pages 2009
A controllable and accountable state-oriented Card-Aided Firewall
Fulltext Access 11 Pages 2009
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Fulltext Access 11 Pages 2009
A two-stage modelling architecture for distributed control of real-time industrial systems: Application of UML and Petri Net
Fulltext Access 11 Pages 2009
Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video
Fulltext Access 11 Pages 2009
Using empirical mode decomposition for iris recognition
Fulltext Access 11 Pages 2009
Performance evaluation of wireless sensor network with hybrid channel access mechanism
Fulltext Access 11 Pages 2009
Joint design of spectrum sharing and routing with channel heterogeneity in cognitive radio networks
Fulltext Access 11 Pages 2009
Statistical resource allocation for multi-band Cognitive Radio systems
Fulltext Access 11 Pages 2009
A new low power reconfigurable decimation–interpolation and masking based filter architecture for channel adaptation in cognitive radio handsets
Fulltext Access 11 Pages 2009
Sequence detection for MPSK/MQAM with adaptive phase tracking
Fulltext Access 11 Pages 2009
Multiresolution wavelet denoising for ultra-wideband time-of-arrival estimation with regularized least squares
Fulltext Access 11 Pages 2009
Code-shifted reference transceiver for impulse radio ultra-wideband systems
Fulltext Access 11 Pages 2009
Modeling, validation and performance evaluation of body shadowing effect in ultra-wideband networks
Fulltext Access 11 Pages 2009
Resource provisioning for survivable WDM networks under a sliding scheduled traffic model
Fulltext Access 11 Pages 2009
Performance analysis and dimensioning of multi-granular optical networks
Fulltext Access 11 Pages 2009
Design tool and its experimental validation for SOA-based photonic signal processing
Fulltext Access 11 Pages 2009
A policy-based authorization model for workflow-enabled dynamic process management
Fulltext Access 11 Pages 2009
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
Fulltext Access 11 Pages 2009
Dual-rail transition logic: A logic style for counteracting power analysis attacks
Fulltext Access 11 Pages 2009
MetaCDN: Harnessing ‘Storage Clouds’ for high performance content delivery
Fulltext Access 11 Pages 2009
BARC: A Battery Aware Reliable Clustering algorithm for sensor networks
Fulltext Access 11 Pages 2009
Attacking smart card systems: Theory and practice
Fulltext Access 11 Pages 2009
Protecting clients from insider attacks on trust accounts
Fulltext Access 11 Pages 2009
Human factors in information security: The insider threat – Who can you trust these days?
Fulltext Access 11 Pages 2009
Enforcing role based access control model with multimedia signatures
Fulltext Access 11 Pages 2009
Data concealment and detection in Microsoft Office 2007 files
Fulltext Access 11 Pages 2009
Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records
Fulltext Access 11 Pages 2009
Extraction of forensically sensitive information from windows physical memory
Fulltext Access 11 Pages 2009
Identification and recovery of JPEG files with missing fragments
Fulltext Access 11 Pages 2009
DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge
Fulltext Access 11 Pages 2009
Concurrency control in mobile distributed real-time database systems
Fulltext Access 11 Pages 2009
Source level merging of independent programs
Fulltext Access 11 Pages 2009
Analysis of DNA sequence transformations on grids
Fulltext Access 11 Pages 2009
ORION — Ontology-based queRy routIng in Overlay Networks
Fulltext Access 11 Pages 2009
A reindexing based approach towards mapping of DAG with affine schedules onto parallel embedded systems
Fulltext Access 11 Pages 2009
Reliability versus performance for critical applications
Fulltext Access 11 Pages 2009
Computational forces in the SAGE benchmark
Fulltext Access 11 Pages 2009
Buffer management for lossless service in shared buffer switches
Fulltext Access 11 Pages 2009
Analyzing the techniques that improve fault tolerance of aggregation trees in sensor networks
Fulltext Access 11 Pages 2009
Bandwidth guaranteed multicast scheduling for virtual output queued packet switches
Fulltext Access 11 Pages 2009
Load-balancing on swapped or OTIS networks
Fulltext Access 11 Pages 2009
A novel distributed architecture of large-scale multimedia storage system using autonomous object-based storage devices
Fulltext Access 11 Pages 2009
Scheduling on-demand broadcast with timing constraints
Fulltext Access 11 Pages 2009
A genetic approach to joint routing and link scheduling for wireless mesh networks
Fulltext Access 11 Pages 2009
Identification of a continuous time nonlinear state space model for the external power system dynamic equivalent by neural networks
Fulltext Access 11 Pages 2009
Velocity relaxed and craziness-based swarm optimized intelligent PID and PSS controlled AVR system
Fulltext Access 11 Pages 2009
A survey of critical research areas in the energy segment of restructured electric power markets
Fulltext Access 11 Pages 2009
The effects of information overload on consumers’ subjective state towards buying decision in the internet shopping environment
Fulltext Access 11 Pages 2009
Fuzzy computational models for trust and reputation systems
Fulltext Access 11 Pages 2009
Coordinated selection of procurement bids in finite capacity environments
Fulltext Access 11 Pages 2009
Value creation using alliances within the software industry
Fulltext Access 11 Pages 2009
Consideration sets in online shopping environments: the effects of search tool and information load
Fulltext Access 11 Pages 2009
Discovering recency, frequency, and monetary (RFM) sequential patterns from customers’ purchasing data
Fulltext Access 11 Pages 2009
Interactive visualizations for critical infrastructure analysis
Fulltext Access 11 Pages 2009
Application of trusted network technology to industrial control networks
Fulltext Access 11 Pages 2009
Optimal flow control for utility-lifetime tradeoff in wireless sensor networks
Fulltext Access 11 Pages 2009
Chaos-based discrete fractional Sine transform domain audio watermarking scheme
Fulltext Access 11 Pages 2009
Support vector regression for link load prediction
Fulltext Access 11 Pages 2009
Routing and resource optimization in service overlay networks
Fulltext Access 11 Pages 2009
Understanding Skype signaling
Fulltext Access 11 Pages 2009
Layered Diffusion-based Coverage Control in Wireless Sensor Networks
Fulltext Access 11 Pages 2009
Cross-layer optimized wireless multicast for layered media
Fulltext Access 11 Pages 2009
Overcoming controllability problems with fewest channels between testers
Fulltext Access 11 Pages 2009
Analytical framework for dimensioning hierarchical WiMax–WiFi networks
Fulltext Access 11 Pages 2009
Access network synthesis game in next generation networks
Fulltext Access 11 Pages 2009
Improving routing distance for geographic multicast with Fermat points in mobile ad hoc networks
Fulltext Access 11 Pages 2009
Architecture and scalability of a high-speed traffic measurement platform with a highly flexible packet classification
Fulltext Access 11 Pages 2009
A simulation of an economic, self-organising resource allocation approach for application layer networks
Fulltext Access 11 Pages 2009
Understanding the physical and economic consequences of attacks on control systems
Fulltext Access 11 Pages 2009
Traffic monitor deployment in IP networks
Fulltext Access 11 Pages 2009
RANC: Relay-aided network coding in multi-hop wireless networks
Fulltext Access 11 Pages 2009
Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks
Fulltext Access 11 Pages 2009
Routing based on delivery distributions in predictable disruption tolerant networks
Fulltext Access 11 Pages 2009
On construction of minimum energy k-fault resistant topologies
Fulltext Access 11 Pages 2009
Localised alpha-shape computations for boundary recognition in sensor networks
Fulltext Access 11 Pages 2009
Channel propagation characteristics of wireless MICAz sensor nodes
Fulltext Access 11 Pages 2009
Minimum energy hierarchical dynamic source routing for Mobile Ad Hoc Networks
Fulltext Access 11 Pages 2009
Defense against misbehavior in anonymous vehicular ad hoc networks
Fulltext Access 11 Pages 2009
Time-domain analysis of lossy active transmission lines using FDTD method
Fulltext Access 11 Pages 2009
Error propagation analysis for underwater cooperative multi-hop communications
Fulltext Access 11 Pages 2009
<< < 303 304 305 306 307 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities