• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Efficient verifier-based password-authenticated key exchange in the three-party setting
Fulltext Access 8 Pages 2007
FriendlyRoboCopy: A GUI to RoboCopy for computer forensic investigators
Fulltext Access 8 Pages 2007
Biology, immunology and information security
Fulltext Access 8 Pages 2007
M-CLIQUES: Modified CLIQUES key agreement for secure multicast
Fulltext Access 8 Pages 2007
Intrusion detection using text processing techniques with a kernel based similarity measure
Fulltext Access 8 Pages 2007
Forensic artefacts left by Pidgin Messenger 2.0
Fulltext Access 8 Pages 2007
Assessing the security perceptions of personal Internet users
Fulltext Access 8 Pages 2007
Authentication in a layered security approach for mobile ad hoc networks
Fulltext Access 8 Pages 2007
Phishing for user security awareness
Fulltext Access 8 Pages 2007
Value-focused assessment of ICT security awareness in an academic environment
Fulltext Access 8 Pages 2007
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection
Fulltext Access 8 Pages 2007
Masquerade detection by boosting decision stumps using UNIX commands
Fulltext Access 8 Pages 2007
Capture – A behavioral analysis tool for applications and documents
Fulltext Access 8 Pages 2007
A real-time shot cut detector: Hardware implementation
Fulltext Access 8 Pages 2007
Measures of retaining digital evidence to prosecute computer-based cyber-crimes
Fulltext Access 8 Pages 2007
The effects of aperture jitter and clock jitter in wideband ADCs
Fulltext Access 8 Pages 2007
Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals
Fulltext Access 8 Pages 2007
Security enhancement of an IC-card-based remote login mechanism
Fulltext Access 8 Pages 2007
Coordinated interaction using reliable broadcast in mobile wireless networks
Fulltext Access 8 Pages 2007
Modified EDCF to improve the performance of IEEE 802.11e WLAN
Fulltext Access 8 Pages 2007
Programming the Grid with POP-C ++
Fulltext Access 8 Pages 2007
Energy-aware location error handling for object tracking applications in wireless sensor networks
Fulltext Access 8 Pages 2007
Analytical modeling of a time-threshold based bandwidth allocation scheme for cellular networks
Fulltext Access 8 Pages 2007
A new high rate adaptive wireless data dissemination scheme
Fulltext Access 8 Pages 2007
Inconsistency of expert judgment-based estimates of software development effort
Fulltext Access 8 Pages 2007
Efficiency study of the information flow mechanism enabling interworking of heterogeneous wireless systems
Fulltext Access 8 Pages 2007
Collocation optimizations in an aspect-oriented middleware system
Fulltext Access 8 Pages 2007
Common defects in information security management system of Korean companies
Fulltext Access 8 Pages 2007
New results on non-perfect sharing of multiple secrets
Fulltext Access 8 Pages 2007
ID-based restrictive partially blind signatures and applications
Fulltext Access 8 Pages 2007
Self-certified signature scheme from pairings
Fulltext Access 8 Pages 2007
Verification of instrumentation techniques for resource management of real-time systems
Fulltext Access 8 Pages 2007
Feedback control-based dynamic resource management in distributed real-time systems
Fulltext Access 8 Pages 2007
Reflections on 10 years of sponsored senior design projects: Students win–clients win!
Fulltext Access 8 Pages 2007
The influence of COCOMO on software engineering education and training
Fulltext Access 8 Pages 2007
Open standards, open formats, and open source
Fulltext Access 8 Pages 2007
Performance of FH/MFSK systems with readable erasures
Fulltext Access 8 Pages 2007
Implementation methods of repetitive sampling on an OTDR for alignment of ghost reflection in short-period measurement with a short-length fiber
Fulltext Access 8 Pages 2007
Low complexity radix-4 butterfly design for the soft-decision Viterbi decoder
Fulltext Access 8 Pages 2007
Efficient parallel multiplier in shifted polynomial basis
Fulltext Access 8 Pages 2007
Capability-based egress network access control by using DNS server
Fulltext Access 8 Pages 2007
In the new converged world are we secure enough?
Fulltext Access 8 Pages 2007
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Fulltext Access 8 Pages 2007
Internet as a multiple graph structure: The role of the transport layer
Fulltext Access 8 Pages 2007
Coordinated decision making in distributed applications
Fulltext Access 8 Pages 2007
On the deployment of a real scalable delegation service
Fulltext Access 8 Pages 2007
Introducing the Microsoft Vista event log file format
Fulltext Access 8 Pages 2007
On minimizing the number of ADMs—Tight bounds for an algorithm without preprocessing
Fulltext Access 8 Pages 2007
An argument for simple embedded ACL optimisation
Fulltext Access 8 Pages 2007
Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks
Fulltext Access 8 Pages 2007
Fixed collision rate back-off scheme for collision resolution in wireless networks
Fulltext Access 8 Pages 2007
An ontology description for SIP security flaws
Fulltext Access 8 Pages 2007
Geo-encryption protocol for mobile networks
Fulltext Access 8 Pages 2007
A cross-layer transmission scheduling scheme for wireless sensor networks
Fulltext Access 8 Pages 2007
Adaptive clustering in wireless sensor networks by mining sensor energy data
Fulltext Access 8 Pages 2007
Cross-layer modeling of capacity in wireless networks: Application to UMTS/HSDPA, IEEE802.11 WLAN and IEEE802.16 WiMAX
Fulltext Access 8 Pages 2007
Deployable multipath communication scheme with sufficient performance data distribution method
Fulltext Access 8 Pages 2007
Secure emergency communication of cellular phones in ad hoc mode
Fulltext Access 8 Pages 2007
A note on scaling the Linpack benchmark
Fulltext Access 8 Pages 2007
Fairness comparison of FAST TCP and TCP Reno
Fulltext Access 8 Pages 2007
On collaborative content distribution using multi-message gossip
Fulltext Access 8 Pages 2007
GridX1: A Canadian computational grid
Fulltext Access 8 Pages 2007
A structured hierarchical P2P model based on a rigorous binary tree code algorithm
Fulltext Access 8 Pages 2007
A decentralized resource allocation policy in minigrid
Fulltext Access 8 Pages 2007
A catallactic market for data mining services
Fulltext Access 8 Pages 2007
MAPFS-DAI, an extension of OGSA-DAI based on a parallel file system
Fulltext Access 8 Pages 2007
Mining performance data for metascheduling decision support in the Grid
Fulltext Access 8 Pages 2007
Distributed data mining in grid computing environments
Fulltext Access 8 Pages 2007
Mining of the chemical information in GRID environment
Fulltext Access 8 Pages 2007
Distributed data mining on Agent Grid: Issues, platform and development toolkit
Fulltext Access 8 Pages 2007
Distributed data mining services leveraging WSRF
Fulltext Access 8 Pages 2007
Analytical array polynomial method for linear antenna arrays with phase-only control
Fulltext Access 8 Pages 2007
A versatile signal flow graph realization of a general transfer function by using CDBA
Fulltext Access 8 Pages 2007
Multiuser detection of time-hopping PPM UWB system in the presence of multipath fading
Fulltext Access 8 Pages 2007
LSSP: A novel local segment-shared protection for multi-domain optical mesh networks
Fulltext Access 8 Pages 2007
Analytical model for authentication transmission overhead between entities in mobile networks
Fulltext Access 8 Pages 2007
Comparison of three different architectures for active resistive memories
Fulltext Access 8 Pages 2007
Hybrid coupling scheme for UMTS and wireless LAN interworking
Fulltext Access 8 Pages 2007
Instability effects of two-way traffic in a TCP/AQM system
Fulltext Access 8 Pages 2007
A scalability comparison of GST and SST MANET multicast routing algorithms
Fulltext Access 8 Pages 2007
Priority-enabled optical shared protection: An online efficiency evaluation study
Fulltext Access 8 Pages 2007
Modeling of streaming and elastic flow integration in OFDMA-based IEEE802.16 WiMAX
Fulltext Access 8 Pages 2007
Webmages: An agent platform based on web services
Fulltext Access 8 Pages 2007
Handoff multiple queue model in microcellular networks
Fulltext Access 8 Pages 2007
Truly random number generators based on a non-autonomous chaotic oscillator
Fulltext Access 8 Pages 2007
Transformation formulas for spherical and spheroidal multipole fields
Fulltext Access 8 Pages 2007
Edge detection in noisy images by neuro-fuzzy processing
Fulltext Access 8 Pages 2007
An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks
Fulltext Access 8 Pages 2007
Performance evaluation of minimum interference routing in network scenarios with protection requirements
Fulltext Access 8 Pages 2007
Using neighborhood-pixels-information and ANFIS for impulsive noise suppression
Fulltext Access 8 Pages 2007
Seamless transport service selection by deploying a middleware
Fulltext Access 8 Pages 2007
Generating homogeneous magnetostatic field inside prolate and oblate ellipsoidal coil
Fulltext Access 8 Pages 2007
Threshold password authentication against guessing attacks in Ad hoc networks
Fulltext Access 9 Pages 2007
Loss behavior in space priority queue with batch Markovian arrival process — continuous-time case
Fulltext Access 9 Pages 2007
Network monitoring and performance evaluation in a 3.5G network
Fulltext Access 9 Pages 2007
A distributed switch scheduling algorithm
Fulltext Access 9 Pages 2007
A genetic approach for adding QoS to distributed virtual environments
Fulltext Access 9 Pages 2007
Power and dispersion constrained optimization of optical links with unequally-spaced repeater modules
Fulltext Access 9 Pages 2007
Performance analysis of modified prime-hop codes for OCDMA systems with multiuser detectors
Fulltext Access 9 Pages 2007
Cross-phase modulation induced modulation instability in single-mode optical fibers with saturable nonlinearity
Fulltext Access 9 Pages 2007
<< < 334 335 336 337 338 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities