• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

An examination into MSN Messenger 7.5 contact identification
Fulltext Access 5 Pages 2006
Software maintenance outsourcing: Issues and strategies
Fulltext Access 5 Pages 2006
Re-engineering enterprise security
Fulltext Access 5 Pages 2006
Component interfaces that support measurement uncertainty
Fulltext Access 5 Pages 2006
Guest Editorial
Fulltext Access 5 Pages 2006
Special issue on Web dynamics
Fulltext Access 5 Pages 2006
Gathering-based routing protocol in mobile ad hoc networks
Fulltext Access 5 Pages 2006
Security flaws of remote user access over insecure networks
Fulltext Access 5 Pages 2006
Information Security Governance: A model based on the Direct–Control Cycle
Fulltext Access 5 Pages 2006
Infection, imitation and a hierarchy of computer viruses
Fulltext Access 5 Pages 2006
Self-reported computer criminal behavior: A psychological analysis
Fulltext Access 5 Pages 2006
Criminalising hacking tools
Fulltext Access 5 Pages 2006
The complexity of DPA type side channel attacks and their dependency on the algorithm design
Fulltext Access 5 Pages 2006
New techniques for enhancing accuracy of EMTP/TSP hybrid simulation
Fulltext Access 5 Pages 2006
An approximate solution to lower tap changing or capacitors regulator times in reactive power control in distribution systems
Fulltext Access 5 Pages 2006
Effect of losses on area prices in the Norwegian electricity market
Fulltext Access 5 Pages 2006
Renewable energy sources for peak load demand management in India
Fulltext Access 5 Pages 2006
Dynamic voltage stability constrained ATC calculation by a QSS approach
Fulltext Access 5 Pages 2006
Analysis of subsynchronous resonance in a multi-machine power system using series compensation
Fulltext Access 5 Pages 2006
Windows device interface security
Fulltext Access 6 Pages 2006
Volume Indices - article, author, keyword
Fulltext Access 6 Pages 2006
Block adaptive shifting algorithm for filtering based on the Toeplitz preconditioned conjugate gradient technique
Fulltext Access 6 Pages 2006
A novel scheme of optical-code label switching without a strict timing
Fulltext Access 6 Pages 2006
A novel remote user authentication scheme using bilinear pairings
Fulltext Access 6 Pages 2006
Dynamic reuse of subroutine results
Fulltext Access 6 Pages 2006
A traceable threshold signature scheme with multiple signing policies
Fulltext Access 6 Pages 2006
Security implications in RFID and authentication processing framework
Fulltext Access 6 Pages 2006
Product roundup
Fulltext Access 6 Pages 2006
Simplified method for protecting the power capacitor from over-voltage/over-current
Fulltext Access 6 Pages 2006
Computer forensics and electronic discovery: The new management challenge
Fulltext Access 6 Pages 2006
Cryptanalysis of a hybrid authentication protocol for large mobile networks
Fulltext Access 6 Pages 2006
ISMS, security standards and security regulations
Fulltext Access 6 Pages 2006
Security considerations for incremental hash functions based on pair block chaining
Fulltext Access 6 Pages 2006
Buffer analysis with finite number of tunable receivers in WDM passive star networks
Fulltext Access 6 Pages 2006
High-performance and wideband amplifier using bismuth-oxide-based EDF with cascade configurations
Fulltext Access 6 Pages 2006
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Fulltext Access 6 Pages 2006
Novel architectural schemes for wavelength conversions in optical cross connect systems
Fulltext Access 6 Pages 2006
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem
Fulltext Access 6 Pages 2006
Selective and intelligent imaging using digital evidence bags
Fulltext Access 6 Pages 2006
Detecting false captioning using common-sense reasoning
Fulltext Access 6 Pages 2006
WDM high speed chirped DPSK fiber optical system transmission modeling in presence of PMD, PDL, and CD
Fulltext Access 6 Pages 2006
Design and analysis of synchronous dynamic frequency hopping code division multiple access communication system
Fulltext Access 6 Pages 2006
Newsgroups reborn – The binary posting renaissance
Fulltext Access 6 Pages 2006
On the security of the Yen–Guo’s domino signal encryption algorithm (DSEA)
Fulltext Access 6 Pages 2006
A two-dimensional circumplex approach to the development of a hacker taxonomy
Fulltext Access 6 Pages 2006
Mass image classification
Fulltext Access 6 Pages 2006
Case study: AOL instant messenger trace evidence
Fulltext Access 6 Pages 2006
A differential approach to solve the inverse eigenvalue problem derived from a neural network
Fulltext Access 6 Pages 2006
An effective method for extracting singular points in fingerprint images
Fulltext Access 6 Pages 2006
A novel low mutual coupling microstrip antenna array design using defected ground structure
Fulltext Access 6 Pages 2006
A comparison of scheduling mechanisms for service class differentiation in HSDPA networks
Fulltext Access 6 Pages 2006
New and old results for the M/D/c queue
Fulltext Access 6 Pages 2006
An efficient solution for mitigating light-load penalty in EPONs
Fulltext Access 6 Pages 2006
Analysis of a model of two overflow traffic components with different serving intensities
Fulltext Access 6 Pages 2006
Author-Title Index for Volume
Fulltext Access 6 Pages 2006
A parallel computing algorithm for 16S rRNA probe design
Fulltext Access 6 Pages 2006
Further remark on P systems with active membranes and two polarizations
Fulltext Access 6 Pages 2006
Efficient algorithm for placing a given number of base stations to cover a convex region
Fulltext Access 6 Pages 2006
On switching networks with rearrangement or repacking
Fulltext Access 6 Pages 2006
AMROEBA: Computational astrophysics modeling enabled by dynamic lambda switching
Fulltext Access 6 Pages 2006
Using RDF to describe networks
Fulltext Access 6 Pages 2006
High-definition multimedia for multiparty low-latency interactive communication
Fulltext Access 6 Pages 2006
An online preventive control approach for dynamic security of power transmission using a database system
Fulltext Access 6 Pages 2006
A novel market-based reactive power management scheme
Fulltext Access 6 Pages 2006
Power quality analysis based on fuzzy estimation algorithm: Voltage flicker measurements
Fulltext Access 6 Pages 2006
Bidding strategies in Brazilian electricity auctions
Fulltext Access 6 Pages 2006
Recursive identification of harmonic loads in power systems
Fulltext Access 6 Pages 2006
An efficient approach for short term load forecasting using artificial neural networks
Fulltext Access 6 Pages 2006
Extraction of small-signal equivalent circuit model parameters for Si/SiGe HBT using S-parameters measurements and one geometrical information
Fulltext Access 6 Pages 2006
Efficient remote mutual authentication and key agreement
Fulltext Access 6 Pages 2006
PING attack – How bad is it?
Fulltext Access 6 Pages 2006
List of referees
Fulltext Access 6 Pages 2006
Recent advances in wireless networks and systems
Fulltext Access 6 Pages 2006
Multi-user data multiplexing for digital multimedia broadcasting
Fulltext Access 6 Pages 2006
Speed enhancement of a class of digital phase locked loops (DPLLs) by dynamic gain control technique
Fulltext Access 6 Pages 2006
An ISM band CMOS power amplifier design for WLAN
Fulltext Access 6 Pages 2006
GeoSENS: geo-based sensor network secure communication protocol
Fulltext Access 6 Pages 2006
Counter-based reliability optimization for gossip-based broadcasting
Fulltext Access 6 Pages 2006
A regularized Newton method for one-dimensional profile inversion of a lossy cylinder
Fulltext Access 6 Pages 2006
New universal filter using only current followers as active elements
Fulltext Access 6 Pages 2006
Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks
Fulltext Access 6 Pages 2006
An examination into Yahoo Messenger 7.0 contact identification
Fulltext Access 7 Pages 2006
Identifying almost identical files using context triggered piecewise hashing
Fulltext Access 7 Pages 2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks
Fulltext Access 7 Pages 2006
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
Fulltext Access 7 Pages 2006
A cyber forensics ontology: Creating a new approach to studying cyber forensics
Fulltext Access 7 Pages 2006
Searching for processes and threads in Microsoft Windows memory dumps
Fulltext Access 7 Pages 2006
A strategy for testing hardware write block devices
Fulltext Access 7 Pages 2006
New Vistas in elliptic curve cryptography
Fulltext Access 7 Pages 2006
On the potential of high density smart cards
Fulltext Access 7 Pages 2006
A quantitative method for ISO 17799 gap analysis
Fulltext Access 7 Pages 2006
Using a role scheme to derive software project metrics
Fulltext Access 7 Pages 2006
Identifying an existing file via KaZaA artefacts
Fulltext Access 7 Pages 2006
Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges
Fulltext Access 7 Pages 2006
The Computer Misuse Act
Fulltext Access 7 Pages 2006
Preparing Information Security for legal and regulatory compliance (Sarbanes–Oxley and Basel II)
Fulltext Access 7 Pages 2006
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
Fulltext Access 7 Pages 2006
Integrity of intention (a theory of types for security APIs)
Fulltext Access 7 Pages 2006
An overview of RFID tags and new cryptographic developments
Fulltext Access 7 Pages 2006
Application of temporal and spatial role based access control in 802.11 wireless networks
Fulltext Access 7 Pages 2006
<< < 350 351 352 353 354 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities