• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Probabilistic model checking for the quantification of DoS security threats
Fulltext Access 16 Pages 2009
nAIT: A source analysis and instrumentation framework for nesC
Fulltext Access 16 Pages 2009
Autonomous mobile agent routing for efficient server resource allocation
Fulltext Access 16 Pages 2009
Differentiated survivability with improved fairness in IP/MPLS-over-WDM optical networks
Fulltext Access 16 Pages 2009
A measurement study supporting P2P file-sharing community models
Fulltext Access 16 Pages 2009
Achieving efficiency, quality of service and robustness in multi-organizational Grids
Fulltext Access 16 Pages 2009
Dynamic Web Service discovery architecture based on a novel peer based overlay network
Fulltext Access 16 Pages 2009
Algorithms and performance of load-balancing with multiple hash functions in massive content distribution
Fulltext Access 16 Pages 2009
Issues in using model checkers for test case generation
Fulltext Access 16 Pages 2009
Topology-aware overlay path probing
Fulltext Access 16 Pages 2009
Mining frequent patterns in image databases with 9D-SPA representation
Fulltext Access 16 Pages 2009
Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS
Fulltext Access 16 Pages 2009
Data aggregation and routing in Wireless Sensor Networks: Optimal and heuristic algorithms
Fulltext Access 16 Pages 2009
Maximizing the capacity of mobile cellular networks with heterogeneous traffic
Fulltext Access 16 Pages 2009
CUDL language semantics: Updating FDB data
Fulltext Access 16 Pages 2009
Model-driven eGovernment interoperability: A review of the state of the art
Fulltext Access 16 Pages 2009
Protocol interoperability in mobile IP enabled mobile ad hoc networks
Fulltext Access 16 Pages 2009
Ontology tailoring in the Semantic Grid
Fulltext Access 16 Pages 2009
Information security policy: An organizational-level process model
Fulltext Access 16 Pages 2009
User perceptions of security, convenience and usability for ebanking authentication tokens
Fulltext Access 16 Pages 2009
Towards secure dynamic collaborations with group-based RBAC model
Fulltext Access 16 Pages 2009
DOM tree browsing of a very large XML document: Design and implementation
Fulltext Access 16 Pages 2009
An accelerator design for speedup of Java execution in consumer mobile devices
Fulltext Access 16 Pages 2009
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
Fulltext Access 16 Pages 2009
Searching for similar trajectories in spatial networks
Fulltext Access 17 Pages 2009
Lightweight query-based analysis of workflow process dependencies
Fulltext Access 17 Pages 2009
Improving reliability of cooperative concurrent systems with exception flow analysis
Fulltext Access 17 Pages 2009
An engineering approach to the design of a BcN control network
Fulltext Access 17 Pages 2009
Design pattern recovery through visual language parsing and source code analysis
Fulltext Access 17 Pages 2009
A family of experiments to evaluate a functional size measurement procedure for Web applications
Fulltext Access 17 Pages 2009
MyAds: A system for adaptive pervasive advertisements
Fulltext Access 17 Pages 2009
Combined person tracking and classification in a network of chemical sensors
Fulltext Access 17 Pages 2009
Target localization in camera wireless networks
Fulltext Access 17 Pages 2009
Self-organization of unattended wireless acoustic sensor networks for ground target tracking
Fulltext Access 17 Pages 2009
Signal propagation techniques for wireless underground communication networks
Fulltext Access 17 Pages 2009
Adaptive state-based multi-radio multi-channel multi-path routing in Wireless Mesh Networks
Fulltext Access 17 Pages 2009
Evidential fusion of sensor data for activity recognition in smart homes
Fulltext Access 17 Pages 2009
A compressed sensing receiver for UWB impulse radio in bursty applications like wireless sensor networks
Fulltext Access 17 Pages 2009
Admission control for differentiated services in future generation CDMA networks
Fulltext Access 17 Pages 2009
A hybrid approach for content-based publish/subscribe in vehicular networks
Fulltext Access 17 Pages 2009
Assessing everyday life behavioral rhythms for the older generation
Fulltext Access 17 Pages 2009
Extended EDCA for delay guarantees in wireless local area networks
Fulltext Access 17 Pages 2009
A mobile agent platform for distributed network and systems management
Fulltext Access 17 Pages 2009
Modeling the effect of node synchronization times in ultra-wideband wireless networks
Fulltext Access 17 Pages 2009
Energy optimization for proactive unicast route maintenance in MANETs under end-to-end reliability requirements
Fulltext Access 17 Pages 2009
Security extensions for integrity and confidentiality in embedded processors
Fulltext Access 17 Pages 2009
Using aspect orientation in legacy environments for reverse engineering using dynamic analysis—An industrial experience report
Fulltext Access 17 Pages 2009
A holistic approach to managing software change impact
Fulltext Access 17 Pages 2009
An overhead and resource contention aware analytical model for overloaded Web servers
Fulltext Access 17 Pages 2009
Selecting highly optimal architectural feature sets with Filtered Cartesian Flattening
Fulltext Access 17 Pages 2009
Enriching software architecture documentation
Fulltext Access 17 Pages 2009
Autonomic QoS control in enterprise Grid environments using online simulation
Fulltext Access 17 Pages 2009
Achieving millennium development goals: Role of ICTS innovations in India
Fulltext Access 17 Pages 2009
Case study on distributed and fault tolerant system modeling based on timed automata
Fulltext Access 17 Pages 2009
Incentive-based control of ad hoc networks: A performance study
Fulltext Access 17 Pages 2009
Modeling bufferless packet-switching networks with packet dependencies
Fulltext Access 17 Pages 2009
Time-bounded distributed QoS-aware service configuration in heterogeneous cooperative environments
Fulltext Access 17 Pages 2009
Policy-constrained bio-inspired processes for autonomic route management
Fulltext Access 17 Pages 2009
Modelisation and validation of a full deterministic medium access method for IEEE 802.15.4 WPAN
Fulltext Access 17 Pages 2009
Minimum disruption service composition and recovery in mobile ad hoc networks
Fulltext Access 17 Pages 2009
Transparent autonomization in CORBA
Fulltext Access 17 Pages 2009
Detecting and connecting disjoint sub-networks in wireless sensor and actor networks
Fulltext Access 17 Pages 2009
Rappel: Exploiting interest and network locality to improve fairness in publish-subscribe systems
Fulltext Access 17 Pages 2009
Optimal node-selection algorithm for parallel download in overlay content-distribution networks
Fulltext Access 17 Pages 2009
Spatio-temporal thermal-aware job scheduling to minimize energy consumption in virtualized heterogeneous data centers
Fulltext Access 17 Pages 2009
CDM-based design and performance evaluation of a robust AQM method for dynamic TCP/AQM networks
Fulltext Access 17 Pages 2009
Public key cryptography based privacy preserving multi-context RFID infrastructure
Fulltext Access 17 Pages 2009
Encounter-based worms: Analysis and defense
Fulltext Access 17 Pages 2009
Bio-inspired multi-agent data harvesting in a proactive urban monitoring environment
Fulltext Access 17 Pages 2009
An 802.11e HCCA scheduler with an end-to-end quality aware territory method
Fulltext Access 17 Pages 2009
Experimentation-oriented platform for development and evaluation of MANET cross-layer protocols
Fulltext Access 17 Pages 2009
Sorting Reordered Packets with Interrupt Coalescing
Fulltext Access 17 Pages 2009
Providing true end-to-end security in converged voice over IP infrastructures
Fulltext Access 17 Pages 2009
A survey of scheduling metrics and an improved ordering policy for list schedulers operating on workloads with dependencies and a wide variation in execution times
Fulltext Access 17 Pages 2009
A personal Web page tailoring toolkit for mobile devices
Fulltext Access 17 Pages 2009
Secure and efficient group key management with shared key derivation
Fulltext Access 17 Pages 2009
Classification of slice-based VBR video traffic and estimation of link loss by exceedance
Fulltext Access 17 Pages 2009
Feedback-assisted robust estimation of available bandwidth
Fulltext Access 17 Pages 2009
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
Fulltext Access 17 Pages 2009
Self-∗ through self-learning: Overload control for distributed web systems
Fulltext Access 17 Pages 2009
Fault masking by multiple timing faults in timed EFSM models
Fulltext Access 17 Pages 2009
Impact of multiple channels and radios on the performance of a TDMA based wireless mesh network
Fulltext Access 17 Pages 2009
Adapting application execution in CMPs using helper threads
Fulltext Access 17 Pages 2009
Stochastic convex ordering for multiplicative decrease internet congestion control
Fulltext Access 17 Pages 2009
Efficient tag detection in RFID systems
Fulltext Access 17 Pages 2009
Reconfigurable distributed storage for dynamic networks
Fulltext Access 17 Pages 2009
Cost-based admission control for Internet Commerce QoS enhancement
Fulltext Access 18 Pages 2009
Reducing query overhead through route learning in unstructured peer-to-peer network
Fulltext Access 18 Pages 2009
A competent global mobility support scheme in NETLMM
Fulltext Access 18 Pages 2009
An efficient bow-based on-demand QoS routing protocol for MIMO ad hoc networks
Fulltext Access 18 Pages 2009
ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks
Fulltext Access 18 Pages 2009
Agent mobility architecture based on IEEE-FIPA standards
Fulltext Access 18 Pages 2009
WSDL and UDDI extensions for version support in web services
Fulltext Access 18 Pages 2009
Protocol offload analysis by simulation
Fulltext Access 18 Pages 2009
Component-based software version management based on a Component-Interface Dependency Matrix
Fulltext Access 18 Pages 2009
Decentralized multi-dimensional alert correlation for collaborative intrusion detection
Fulltext Access 18 Pages 2009
A survey on dynamic Web content generation and delivery techniques
Fulltext Access 18 Pages 2009
Adaptive disk scheduling with workload-dependent anticipation intervals
Fulltext Access 18 Pages 2009
A lightweight web-based vulnerability scanner for small-scale computer network security assessment
Fulltext Access 18 Pages 2009
Principles and performance analysis of SeCond: A system for epidemic peer-to-peer content distribution
Fulltext Access 18 Pages 2009
<< < 310 311 312 313 314 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities