• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Fast and proximity-aware multi-source overlay multicast under heterogeneous environment
Fulltext Access 11 Pages 2009
Protecting light forest in survivable WDM mesh networks with sparse light splitting
Fulltext Access 11 Pages 2009
Hardware implementation of a pulse mode neural network-based edge detection system
Fulltext Access 11 Pages 2009
Microwave circuit theory-based models to predict the resonant frequencies of a wide range of ring resonators
Fulltext Access 11 Pages 2009
A novel versatile modulator circuit
Fulltext Access 11 Pages 2009
A pattern recognition framework to blind audio watermark decoding
Fulltext Access 11 Pages 2009
Completed analysis of cellular networks with PH-renewal arrival call
Fulltext Access 11 Pages 2009
Dweb model: Representing Web 2.0 dynamism
Fulltext Access 11 Pages 2009
End-to-end epidemic multicast loss recovery: Analysis of scalability and robustness
Fulltext Access 11 Pages 2009
Next generation CATV networks with QoS guarantees
Fulltext Access 11 Pages 2009
A performance study of uplink scheduling algorithms in point-to-multipoint WiMAX networks
Fulltext Access 11 Pages 2009
Impact of bandwidth request schemes for Best-Effort traffic in IEEE 802.16 networks
Fulltext Access 11 Pages 2009
Adaptive Head-to-Tail: Active Queue Management based on implicit congestion signals
Fulltext Access 11 Pages 2009
LGRR: A new packet scheduling algorithm for differentiated services packet-switched networks
Fulltext Access 11 Pages 2009
A new distributed management mechanism for ASI based networks
Fulltext Access 11 Pages 2009
Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations
Fulltext Access 11 Pages 2009
A new intelligent algorithm for online voltage stability assessment and monitoring
Fulltext Access 11 Pages 2009
Network load-aware content distribution in overlay networks
Fulltext Access 11 Pages 2009
High throughput MAC layer multicasting over time-varying channels
Fulltext Access 11 Pages 2009
Assured end-to-end QoS through adaptive marking in multi-domain differentiated services networks
Fulltext Access 11 Pages 2009
Hong Kong and Singapore: Two models of telecommunications regulations?
Fulltext Access 11 Pages 2009
Interdependent technology attributes and the diffusion of consumer electronics
Fulltext Access 11 Pages 2009
Effects of gratification-opportunities and gratifications-obtained on preferences of instant messaging and e-mail among college students
Fulltext Access 11 Pages 2009
Evaluating Internet technologies business effectiveness
Fulltext Access 11 Pages 2009
A model of wireless broadband diffusion in Latin America
Fulltext Access 11 Pages 2009
Exploring a heterogeneous and fragmented digital ecosystem: Mobile content
Fulltext Access 11 Pages 2009
New secure bilateral transaction determination and study of pattern under contingencies and UPFC in competitive hybrid electricity markets
Fulltext Access 11 Pages 2009
MediGRID: Towards a user friendly secured grid infrastructure
Fulltext Access 11 Pages 2009
A study on performance of dynamic file replication algorithms for real-time file access in Data Grids
Fulltext Access 11 Pages 2009
Content-based organisation of virtual repositories of DICOM objects
Fulltext Access 11 Pages 2009
Scientific workflow design for mere mortals
Fulltext Access 11 Pages 2009
A hybrid mechanism for resource/service discovery in ad-hoc grids
Fulltext Access 11 Pages 2009
A new grid resource management mechanism with resource-aware policy administrator for SLA-constrained applications
Fulltext Access 11 Pages 2009
OntoZilla: An ontology-based, semi-structured, and evolutionary peer-to-peer network for information systems and services
Fulltext Access 11 Pages 2009
Query-driven indexing for scalable peer-to-peer text retrieval
Fulltext Access 11 Pages 2009
Deterministic particle filtering for GPS navigation in the presence of multipath
Fulltext Access 11 Pages 2009
A Lagrangean relaxation approach for QoS networks CFA problems
Fulltext Access 11 Pages 2009
A contribution to fast telecommunication system conception: Application to a DS-SS tracking stage improvement
Fulltext Access 11 Pages 2009
Optimal power allocation for the proposed asymmetric turbo code for 3G systems
Fulltext Access 11 Pages 2009
A combinatorial algorithm for the maximum lifetime data gathering with aggregation problem in sensor networks
Fulltext Access 11 Pages 2009
Uplink–downlink duality with regard to constraints imposed in practice
Fulltext Access 11 Pages 2009
Preserving user’s privacy in web search engines
Fulltext Access 11 Pages 2009
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks
Fulltext Access 11 Pages 2009
Framework and implementation of secondary voltage regulation strategy based on multi-agent technology
Fulltext Access 11 Pages 2009
Power quality disturbances analysis based on EDMRA method
Fulltext Access 11 Pages 2009
A passive tree-based backbone construction scheme for MANETs
Fulltext Access 11 Pages 2009
A scalable super-peer approach for public scientific computation
Fulltext Access 11 Pages 2009
Scalable community-driven data sharing in e-science grids
Fulltext Access 11 Pages 2009
Secure on-demand grid computing
Fulltext Access 11 Pages 2009
Concurrent Multipath Transfer during path failure
Fulltext Access 11 Pages 2009
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow
Fulltext Access 12 Pages 2009
Power saving and fault-tolerance in real-time critical embedded systems
Fulltext Access 12 Pages 2009
Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation
Fulltext Access 12 Pages 2009
Autonomic hierarchical reconfiguration for wireless access networks
Fulltext Access 12 Pages 2009
Dependability assessment of by-wire control systems using fault injection
Fulltext Access 12 Pages 2009
Security threats scenarios in trust and reputation models for distributed systems
Fulltext Access 12 Pages 2009
Email licensing
Fulltext Access 12 Pages 2009
A formal framework for real-time information flow analysis
Fulltext Access 12 Pages 2009
DNS-based email sender authentication mechanisms: A critical review
Fulltext Access 12 Pages 2009
SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation
Fulltext Access 12 Pages 2009
Adaptive channel and power allocation of downlink multi-user MC-CDMA systems
Fulltext Access 12 Pages 2009
Landscape-aware location-privacy protection in location-based services
Fulltext Access 12 Pages 2009
Modelling dynamic memory management in constraint-based testing
Fulltext Access 12 Pages 2009
A negotiation framework for content distribution in mobile transient networks
Fulltext Access 12 Pages 2009
Enhancement of anticipative recursively adjusting mechanism for redundant parallel file transfer in data grids
Fulltext Access 12 Pages 2009
On target coverage in wireless heterogeneous sensor networks with multiple sensing units
Fulltext Access 12 Pages 2009
Supporting asynchronous update for distributed data cubes
Fulltext Access 12 Pages 2009
Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks
Fulltext Access 12 Pages 2009
A phenotype reputation estimation function and its study of resilience to social attacks
Fulltext Access 12 Pages 2009
Access region cache with register guided memory reference partitioning
Fulltext Access 12 Pages 2009
A platform-based design framework for joint SW/HW multiprocessor systems design
Fulltext Access 12 Pages 2009
A survey of Flash Translation Layer
Fulltext Access 12 Pages 2009
Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks
Fulltext Access 12 Pages 2009
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks
Fulltext Access 12 Pages 2009
Distributed uplink scheduling and rate control in cdma2000 using adaptive antenna arrays
Fulltext Access 12 Pages 2009
A new technique for planar array antennas synthesis
Fulltext Access 12 Pages 2009
Local search multiuser detection
Fulltext Access 12 Pages 2009
Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks
Fulltext Access 12 Pages 2009
Multi-service traffic profiles to realise and maintain QoS guarantees in wireless LANs
Fulltext Access 12 Pages 2009
Transparent TCP acceleration
Fulltext Access 12 Pages 2009
Optimisation of the pilot-to-data power ratio in the wireless MIMO-OFDM system with low-complexity MMSE channel estimation
Fulltext Access 12 Pages 2009
QoS routing with traffic distribution in mobile ad hoc networks
Fulltext Access 12 Pages 2009
A genetic algorithm for solving virtual source placement problem on WDM networks
Fulltext Access 12 Pages 2009
Intrusion detection alarms reduction using root cause analysis and clustering
Fulltext Access 12 Pages 2009
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Fulltext Access 12 Pages 2009
Network forensics based on fuzzy logic and expert system
Fulltext Access 12 Pages 2009
Enhanced AODV routing protocol for Bluetooth scatternet
Fulltext Access 12 Pages 2009
The Oea framework for class-based object-oriented style JavaScript for web programming
Fulltext Access 12 Pages 2009
A new robust reference watermarking scheme based on DWT-SVD
Fulltext Access 12 Pages 2009
Mechanisms for communication between business and IT experts
Fulltext Access 12 Pages 2009
Human and organizational factors in computer and information security: Pathways to vulnerabilities
Fulltext Access 12 Pages 2009
BGP convergence delay after multiple simultaneous router failures: Characterization and solutions
Fulltext Access 12 Pages 2009
What the heck is this application doing? – A security-by-contract architecture for pervasive services
Fulltext Access 12 Pages 2009
A concise cost analysis of Internet malware
Fulltext Access 12 Pages 2009
A schema for protecting the integrity of databases
Fulltext Access 12 Pages 2009
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements
Fulltext Access 12 Pages 2009
Secure multiparty payment with an intermediary entity
Fulltext Access 12 Pages 2009
Utility-based scheduling for grid computing under constraints of energy budget and deadline
Fulltext Access 12 Pages 2009
Assessment of portlet quality: Collecting real experience
Fulltext Access 12 Pages 2009
Dynamic queue level control of TCP/RED systems in AQM routers
Fulltext Access 12 Pages 2009
<< < 304 305 306 307 308 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities