• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Enterprise information security strategies
Fulltext Access 8 Pages 2008
Critical study of neural networks in detecting intrusions
Fulltext Access 8 Pages 2008
Practical anonymous user authentication scheme with security proof
Fulltext Access 8 Pages 2008
Information security management: An information security retrieval and awareness model for industry
Fulltext Access 8 Pages 2008
Fast and efficient routing algorithms for delay-bounded and dependable channels
Fulltext Access 9 Pages 2008
Progressive decision-based mean type filter for image noise suppression
Fulltext Access 9 Pages 2008
Standardising business application security assessments with pattern-driven audit automations
Fulltext Access 9 Pages 2008
Anonymity analysis in credentials-based systems: A formal framework
Fulltext Access 9 Pages 2008
Redesigning remote system administration paradigms for enhanced security and flexibility
Fulltext Access 9 Pages 2008
Adaptation in current e-learning systems
Fulltext Access 9 Pages 2008
The P2P war: Someone is monitoring your activities
Fulltext Access 9 Pages 2008
A Ubiquitous wireless network architecture and its impact on optical networks
Fulltext Access 9 Pages 2008
On the impact of QoS-sensitivity on correlation structures
Fulltext Access 9 Pages 2008
Emerging structures of P2P networks induced by social relationships
Fulltext Access 9 Pages 2008
Local instantaneous frequency estimation of multi-component signals
Fulltext Access 9 Pages 2008
Performance of 802.11 b/g in the interference limited regime
Fulltext Access 9 Pages 2008
On the nominal capacity of multi-radio multi-channel wireless mesh networks
Fulltext Access 9 Pages 2008
A localization protocol with adaptive power control in wireless sensor networks
Fulltext Access 9 Pages 2008
Achieving proportional loss rate differentiation in a wireless network with a multi-state link
Fulltext Access 9 Pages 2008
Optimization of logical rings for multi-hop transmissions in WDM optical star networks
Fulltext Access 9 Pages 2008
A self-organizing group management middleware for mobile ad-hoc networks
Fulltext Access 9 Pages 2008
CASAN: Clustering algorithm for security in ad hoc networks
Fulltext Access 9 Pages 2008
Self-organizing relay stations in relay based cellular networks
Fulltext Access 9 Pages 2008
Vertical dimensioning: A novel DRR implementation for efficient fair queueing
Fulltext Access 9 Pages 2008
The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface
Fulltext Access 9 Pages 2008
Clustering strategies for improving the lifetime of two-tiered sensor networks
Fulltext Access 9 Pages 2008
Power-delay trade-off in a many-to-many wireless access
Fulltext Access 9 Pages 2008
COMPASS – A tool for evaluation of compression strategies for embedded processors
Fulltext Access 9 Pages 2008
40 Gb/s all-optical regeneration based on the pump depletion effect in fiber parametric amplification
Fulltext Access 9 Pages 2008
An inhomogeneous theory for the analysis of an all-optical gain-stabilized multichannel erbium-doped fiber amplifier in the presence of ion pairs
Fulltext Access 9 Pages 2008
Reconstruction of phase-shifted fiber Bragg grating parameters using genetic algorithm over thermally-modulated reflection intensity spectra
Fulltext Access 9 Pages 2008
Characteristics of bending loss optimized hole assisted fiber
Fulltext Access 9 Pages 2008
The application of spectral-amplitude-coding optical CDMA in passive optical networks
Fulltext Access 9 Pages 2008
Securing Web applications
Fulltext Access 9 Pages 2008
The benefits and drawbacks of using electronic identities
Fulltext Access 9 Pages 2008
Authentication & key agreement for off-portal mobile applications
Fulltext Access 9 Pages 2008
A mobile device management framework for secure service delivery
Fulltext Access 9 Pages 2008
Information security management standards: Compliance, governance and risk management
Fulltext Access 9 Pages 2008
In a ‘trusting’ environment, everyone is responsible for information security
Fulltext Access 9 Pages 2008
An empirical investigation of the factors affecting the adoption of Instant Messaging in organizations
Fulltext Access 9 Pages 2008
PORCE: An efficient power off recovery scheme for flash memory
Fulltext Access 9 Pages 2008
PyFlag – An advanced network forensic framework
Fulltext Access 9 Pages 2008
Limewire examinations
Fulltext Access 9 Pages 2008
Recovering deleted data from the Windows registry
Fulltext Access 9 Pages 2008
Pinpointing TomTom location records: A forensic analysis
Fulltext Access 9 Pages 2008
Building network attack graph for alert causal correlation
Fulltext Access 9 Pages 2008
Improvement of keystroke data quality through artificial rhythms and cues
Fulltext Access 9 Pages 2008
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Fulltext Access 9 Pages 2008
Optimization driven bandwidth provisioning in service overlay networks
Fulltext Access 9 Pages 2008
A generic application sharing architecture based on message-oriented middleware platform
Fulltext Access 9 Pages 2008
Base station placement on boundary of a convex polygon
Fulltext Access 9 Pages 2008
Space-frequency-Doppler coded OFDM over the time-varying Doppler fading channels
Fulltext Access 9 Pages 2008
Quasi-FIFO back-off scheme for collision resolution in wireless networks
Fulltext Access 9 Pages 2008
Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals
Fulltext Access 9 Pages 2008
Grid emulation for managing random sensor networks
Fulltext Access 9 Pages 2008
A singular-value decomposition-based image watermarking using genetic algorithm
Fulltext Access 9 Pages 2008
Throughput enhancement with a modified 802.11 MAC protocol with multi-user detection support
Fulltext Access 9 Pages 2008
FIFO segmentation as a substitute to linked lists
Fulltext Access 9 Pages 2008
A new analytical approach in modeling of multi-loop feed-forward linearized microwave power amplifiers
Fulltext Access 9 Pages 2008
A robust prediction model using ANFIS based on recent TETRA outdoor RF measurements conducted in Riyadh city – Saudi Arabia
Fulltext Access 9 Pages 2008
A relaxation scheme for increasing the parallelism in Jacobi-SVD
Fulltext Access 9 Pages 2008
A pipelined-loop-compatible architecture and algorithm to reduce variable-length sets of floating-point data on a reconfigurable computer
Fulltext Access 9 Pages 2008
Parallel computation of the eigenvalues of symmetric Toeplitz matrices through iterative methods
Fulltext Access 9 Pages 2008
New upper and lower bounds line of sight path loss model for mobile propagation in buildings
Fulltext Access 9 Pages 2008
A distributed approximation algorithm for the minimum degree minimum weight spanning trees
Fulltext Access 9 Pages 2008
Secure multiobjective real and reactive power allocation of thermal power units
Fulltext Access 9 Pages 2008
Stochastic combined heat and power dispatch based on multi-objective particle swarm optimization
Fulltext Access 9 Pages 2008
A game-theoretic model for electricity markets with tight capacity constraints
Fulltext Access 9 Pages 2008
Strategic bidding of generating units in competitive electricity market with considering their reliability
Fulltext Access 9 Pages 2008
Optimal placement of capacitors in distribution systems using an immune multi-objective algorithm
Fulltext Access 9 Pages 2008
Optimising power generation efficiency for head-sensitive cascaded reservoirs in a competitive electricity market
Fulltext Access 9 Pages 2008
Enhanced merit order and augmented Lagrange Hopfield network for hydrothermal scheduling
Fulltext Access 9 Pages 2008
Effects of wind energy supplied by independent power producers on the generation dispatch of electric power utilities
Fulltext Access 9 Pages 2008
Pricing local search engines for company websites
Fulltext Access 9 Pages 2008
Adaptive WAP portals
Fulltext Access 9 Pages 2008
A hybrid open queuing network model approach for multi-threaded dataflow architecture
Fulltext Access 9 Pages 2008
Risk assessment in practice: A real case study
Fulltext Access 9 Pages 2008
Analysis and placement of storage capacity in large distributed video servers
Fulltext Access 9 Pages 2008
Defense against outside attacks in wireless sensor networks
Fulltext Access 9 Pages 2008
Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems
Fulltext Access 9 Pages 2008
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Fulltext Access 9 Pages 2008
A novel open-loop high-speed CMOS sample-and-hold
Fulltext Access 9 Pages 2008
Multi-protocol authentication for SIP/SS7 mobile network
Fulltext Access 9 Pages 2008
Source controlled semi-reliable multimedia streaming using selective retransmission in DCCP/IP networks
Fulltext Access 9 Pages 2008
An efficient uplink mapping scheme for VoIP services in the IEEE 802.16e OFDMA system
Fulltext Access 9 Pages 2008
Adaptive rate scheduling for 3G networks with shared resources using the generalized processor sharing performance model
Fulltext Access 9 Pages 2008
Performance analysis of two throughput-based call admission control schemes for 3G WCDMA wireless networks supporting multiservices
Fulltext Access 9 Pages 2008
Deadline missing predictor based on aperiodic server queue length for distributed systems
Fulltext Access 9 Pages 2008
Models of critical information infrastructure protection
Fulltext Access 9 Pages 2008
Distributed power control and random access for spectrum sharing with QoS constraint
Fulltext Access 9 Pages 2008
Fair bandwidth sharing and delay differentiation: Joint packet scheduling with buffer management
Fulltext Access 9 Pages 2008
Improved bounds for data-gathering time in sensor networks
Fulltext Access 9 Pages 2008
Bandwidth allocation in peer-to-peer file sharing networks
Fulltext Access 9 Pages 2008
Reduced complexity algorithms for cognitive packet network routers
Fulltext Access 9 Pages 2008
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
Fulltext Access 9 Pages 2008
A trust-based security system for ubiquitous and pervasive computing environments
Fulltext Access 9 Pages 2008
Group-based intrusion detection system in wireless sensor networks
Fulltext Access 9 Pages 2008
Robust appearance-guided particle filter for object tracking with occlusion analysis
Fulltext Access 9 Pages 2008
A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications
Fulltext Access 9 Pages 2008
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS
Fulltext Access 9 Pages 2008
<< < 317 318 319 320 321 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities