• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks
Fulltext Access 12 Pages 2007
Adaptive backup routing for ad-hoc networks
Fulltext Access 12 Pages 2007
Bridging the gap between general management and technicians – A case study on ICT security in a developing country
Fulltext Access 12 Pages 2007
O(1)-Reception routing for sensor networks
Fulltext Access 12 Pages 2007
Sensor replacement using mobile robots
Fulltext Access 12 Pages 2007
An agent based and biological inspired real-time intrusion detection and security model for computer network operations
Fulltext Access 12 Pages 2007
A queue management algorithm for fair bandwidth allocation
Fulltext Access 12 Pages 2007
Improving search efficiency using Bloom filters in partially connected ad hoc networks: A node-centric analysis
Fulltext Access 12 Pages 2007
Evaluation of the effect of SSL overhead in the performance of e-business servers operating in B2B scenarios
Fulltext Access 12 Pages 2007
Study of signaling effects on Dynamic Traffic Grooming in IP/MPLS over WDM network
Fulltext Access 12 Pages 2007
On the efficient and fast response for sensor deployment in sparse wireless sensor networks
Fulltext Access 12 Pages 2007
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
Fulltext Access 12 Pages 2007
A user-focused evaluation of web prefetching algorithms
Fulltext Access 12 Pages 2007
The convergence of mobile data phones, consumer electronics, and wallets: Lessons from Japan
Fulltext Access 12 Pages 2007
A low overhead dynamic route repairing mechanism for mobile ad hoc networks
Fulltext Access 12 Pages 2007
Biometric attack vectors and defences
Fulltext Access 12 Pages 2007
Dual-wrapped digital watermarking scheme for image copyright protection
Fulltext Access 12 Pages 2007
Using UML to model relational database operations
Fulltext Access 12 Pages 2007
Implementing regular cash with blind fixed-value electronic coins
Fulltext Access 12 Pages 2007
On state reduction of incompletely specified finite state machines
Fulltext Access 12 Pages 2007
A socket interface for CAN devices
Fulltext Access 12 Pages 2007
Timed verification of hierarchical communicating real-time state machines
Fulltext Access 12 Pages 2007
An open source forensic tool to visualize digital evidence
Fulltext Access 12 Pages 2007
XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges
Fulltext Access 12 Pages 2007
Delta-sigma (ΔΣ) frequency synthesizers for wireless applications
Fulltext Access 12 Pages 2007
Changing user roles in ICT developments; the case of digital television
Fulltext Access 12 Pages 2007
Analysis of a nonpreemptive priority queue with exponential timer and server vacations
Fulltext Access 12 Pages 2007
Performance evaluation of the augmented data vortex switch fabric: An all-optical packet switched interconnection network
Fulltext Access 12 Pages 2007
Optical CDMA network codecs with merged-M-coded wavelength-hopping and prime-coded time-spreading
Fulltext Access 12 Pages 2007
OTDM-based optical communications networks at 160 Gbit/s and beyond
Fulltext Access 12 Pages 2007
Polling models with renewal arrivals: A new method to derive heavy-traffic asymptotics
Fulltext Access 12 Pages 2007
A multiaccess tree algorithm with free access, interference cancellation and single signal memory requirements
Fulltext Access 12 Pages 2007
Multicast inference of temporal loss characteristics
Fulltext Access 12 Pages 2007
The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis
Fulltext Access 12 Pages 2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
Fulltext Access 12 Pages 2007
On evaluating the differences of TCP and ICMP in network measurement
Fulltext Access 12 Pages 2007
FH-RSVP scheme for intra-site handover in hierarchical mobile IPv6 networks
Fulltext Access 12 Pages 2007
A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks
Fulltext Access 13 Pages 2007
UML for systems engineering
Fulltext Access 13 Pages 2007
Extending equation-based congestion control to high-speed and long-distance networks
Fulltext Access 13 Pages 2007
A hybrid load balancing policy underlying grid computing environment
Fulltext Access 13 Pages 2007
Security aspects in IPv6 networks – implementation and testing
Fulltext Access 13 Pages 2007
Identity-based secure collaboration in wireless ad hoc networks
Fulltext Access 13 Pages 2007
Admission and GoS control in a multiservice WCDMA system
Fulltext Access 13 Pages 2007
EAP methods for wireless networks
Fulltext Access 13 Pages 2007
A new technique for minimizing network loss from users’ perspective
Fulltext Access 13 Pages 2007
Web search engine based on DNS
Fulltext Access 13 Pages 2007
When networks collide
Fulltext Access 13 Pages 2007
Rapid implementation and optimisation of DSP systems on FPGA-centric heterogeneous platforms
Fulltext Access 13 Pages 2007
Chip size estimation for SOC design space exploration
Fulltext Access 13 Pages 2007
Design space exploration of reliable networked embedded systems
Fulltext Access 13 Pages 2007
Efficient segment-based video transcoding proxy for mobile multimedia services
Fulltext Access 13 Pages 2007
Malware update
Fulltext Access 13 Pages 2007
System support for web hosting services on server clusters
Fulltext Access 13 Pages 2007
Hamming weight pyramid – A new insight into canonical signed digit representation and its applications
Fulltext Access 13 Pages 2007
An HMM-based call admission control policy for supporting QoS in wireless cellular networks
Fulltext Access 13 Pages 2007
Automated generation of Promela model from SDL specification
Fulltext Access 13 Pages 2007
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
Fulltext Access 13 Pages 2007
Performance metrics and ontologies for Grid workflows
Fulltext Access 13 Pages 2007
QoS multicast routing by using multiple paths/trees in wireless ad hoc networks
Fulltext Access 13 Pages 2007
Instant collision resolution for tag identification in RFID networks
Fulltext Access 13 Pages 2007
A cooperative failure detection mechanism for overlay multicast
Fulltext Access 13 Pages 2007
Reliable and efficient communications in sensor networks
Fulltext Access 13 Pages 2007
A refinement-tree based partitioning method for dynamic load balancing with adaptively refined grids
Fulltext Access 13 Pages 2007
Parallelisation of genetic algorithms for the 2-page crossing number problem
Fulltext Access 13 Pages 2007
Efficient semantic search on DHT overlays
Fulltext Access 13 Pages 2007
CHEMAS: Identify suspect nodes in selective forwarding attacks
Fulltext Access 13 Pages 2007
Speedup and scalability analysis of Master–Slave applications on large heterogeneous clusters
Fulltext Access 13 Pages 2007
A distributed integrated request processing algorithm for QoS assurance in large-scale media-based systems
Fulltext Access 13 Pages 2007
Analysis of area-congestion-based DDoS attacks in ad hoc networks
Fulltext Access 13 Pages 2007
Bio-STEER: A Semantic Web workflow tool for Grid computing in the life sciences
Fulltext Access 13 Pages 2007
A layered workflow knowledge Grid/P2P architecture and its models for future generation workflow systems
Fulltext Access 13 Pages 2007
Efficient Hierarchical Parallel Genetic Algorithms using Grid computing
Fulltext Access 13 Pages 2007
Provision of financial transmission rights including assessment of maximum volumes of obligations and options
Fulltext Access 13 Pages 2007
Dynamic load modeling of an Egyptian primary distribution system using neural networks
Fulltext Access 13 Pages 2007
Intelligent power management strategy of hybrid distributed generation system
Fulltext Access 13 Pages 2007
Distribution strategies for the contextualized mobile Internet
Fulltext Access 13 Pages 2007
Preattentive processing of banner advertisements: The role of modality, location, and interference
Fulltext Access 13 Pages 2007
Procurement models in the agricultural supply chain: A case study of online coffee auctions in India
Fulltext Access 13 Pages 2007
GridJet: An underlying data-transporting protocol for accelerating Web communications
Fulltext Access 13 Pages 2007
Secure multicast in dynamic environments
Fulltext Access 13 Pages 2007
Advances in network smart cards authentication
Fulltext Access 13 Pages 2007
Cryptographic techniques for mobile ad-hoc networks
Fulltext Access 13 Pages 2007
On the peninsula phenomenon in web graph and its implications on web search
Fulltext Access 13 Pages 2007
Scalability and security in biased many-to-one communication
Fulltext Access 13 Pages 2007
Test generation for interaction detection in feature-rich communication systems
Fulltext Access 13 Pages 2007
A study of context inference for Web-based information systems
Fulltext Access 13 Pages 2007
Capacity analysis and MAC enhancement for UWB broadband wireless access networks
Fulltext Access 13 Pages 2007
Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network
Fulltext Access 13 Pages 2007
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications
Fulltext Access 13 Pages 2007
Linear time distributed construction of colored trees for disjoint multipath routing
Fulltext Access 13 Pages 2007
Improving TCP performance over wired–wireless networks
Fulltext Access 13 Pages 2007
A restorable MPLS-based hose-model VPN network
Fulltext Access 13 Pages 2007
State aggregation of large network domains
Fulltext Access 13 Pages 2007
A cellular multi-objective genetic algorithm for optimal broadcasting strategy in metropolitan MANETs
Fulltext Access 13 Pages 2007
QoS-constrained core selection for group communication
Fulltext Access 13 Pages 2007
On the cross-layer interactions between congestion and contention in wireless sensor and actor networks
Fulltext Access 13 Pages 2007
A MAC/Routing cross-layer approach to geographic forwarding in wireless sensor networks
Fulltext Access 13 Pages 2007
SecMR – a secure multipath routing protocol for ad hoc networks
Fulltext Access 13 Pages 2007
Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions
Fulltext Access 13 Pages 2007
<< < 340 341 342 343 344 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities