• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Modeling the performance of flooding in wireless multi-hop Ad hoc networks
Fulltext Access 8 Pages 2006
A prototype for assessing information security awareness
Fulltext Access 8 Pages 2006
Predation and the cost of replication: New approaches to malware prevention?
Fulltext Access 8 Pages 2006
Acknowledgement to Reviewers
Fulltext Access 8 Pages 2006
Secure remote user access over insecure networks
Fulltext Access 8 Pages 2006
Packet-based burst queue modeling at an edge in optical-burst switched networks
Fulltext Access 8 Pages 2006
Cryptanalysis of some improved password-authenticated key exchange schemes
Fulltext Access 8 Pages 2006
Batch verification of validity of bids in homomorphic e-auction
Fulltext Access 8 Pages 2006
Utility-based downlink power allocation in multicell wireless packet networks
Fulltext Access 8 Pages 2006
Minimizing preemption cost for path selection in Diffserv-ware MPLS networks
Fulltext Access 8 Pages 2006
The impact of Soft handoff on the uplink capacity in WCDMA systems
Fulltext Access 8 Pages 2006
Dynamic bandwidth allocation for Internet telephony
Fulltext Access 8 Pages 2006
Service differentiation with MEDF scheduling in TCP/IP networks
Fulltext Access 8 Pages 2006
An anonymous voting mechanism based on the key exchange protocol
Fulltext Access 8 Pages 2006
TCP performance in wireless networks with delay spike and different initial congestion window sizes
Fulltext Access 8 Pages 2006
A latent class modeling approach to detect network intrusion
Fulltext Access 8 Pages 2006
S-shaped TCP: A transport protocol for improving the performance of TCP in fast long-distance networks
Fulltext Access 8 Pages 2006
Performance evaluation of a satellite-switched variable-frame TDMA system
Fulltext Access 8 Pages 2006
A low complexity multiuser detector for synchronous CDMA system
Fulltext Access 8 Pages 2006
Dynamic cell-based MAC protocol for target detection applications in energy-constrained wireless networks
Fulltext Access 8 Pages 2006
Slot synchronized topology-transparent scheduling for sensor networks
Fulltext Access 8 Pages 2006
Energy-efficient coverage problems in wireless ad-hoc sensor networks
Fulltext Access 8 Pages 2006
A novel method for QoS provisioning with protection in GMPLS networks
Fulltext Access 8 Pages 2006
HDA: A hierarchical data aggregation scheme for sensor networks
Fulltext Access 8 Pages 2006
An efficient traffic engineering approach based on flow distribution and splitting in MPLS networks
Fulltext Access 8 Pages 2006
What's rollin' round the bend?
Fulltext Access 8 Pages 2006
A unified model for the implementation of both ISO 9001:2000 and CMMI by ISO-certified organizations
Fulltext Access 8 Pages 2006
Assigning tasks in a 24-h software development model
Fulltext Access 8 Pages 2006
Yet shorter warmup by combining no-state-loss and MRRL for sampled LRU cache simulation
Fulltext Access 8 Pages 2006
On the M(n)/G/∞M(n)/G/∞ steady-state distribution
Fulltext Access 8 Pages 2006
Detailed numerical analysis of a four-wave mixing in dispersion-shifted fiber based all-optical wavelength converter of 10 Gb/s single sideband optical signal
Fulltext Access 8 Pages 2006
Pancyclicity of Möbius cubes with faulty nodes
Fulltext Access 8 Pages 2006
Sim-ARM1136: A case study on the accuracy of the cycle-accurate simulator
Fulltext Access 8 Pages 2006
A power-efficient TCAM architecture for network forwarding tables
Fulltext Access 8 Pages 2006
Quantitative logic-based framework for agile methodologies
Fulltext Access 8 Pages 2006
Managing non-invasive measurement tools
Fulltext Access 8 Pages 2006
A non-invasive approach to product metrics collection
Fulltext Access 8 Pages 2006
Integrating XP project management in development environments
Fulltext Access 8 Pages 2006
A topology discovery algorithm for sensor network using smart antennas
Fulltext Access 8 Pages 2006
Digital signature legislation: The first 10 years
Fulltext Access 8 Pages 2006
Communication service providers: Forensic source and investigatory tool
Fulltext Access 8 Pages 2006
Information security and the law
Fulltext Access 8 Pages 2006
Recent developments in cryptographic hash functions: Security implications and future directions
Fulltext Access 8 Pages 2006
Security standards: An end-user perspective
Fulltext Access 8 Pages 2006
Biometrics: security: An end user perspective
Fulltext Access 8 Pages 2006
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
Fulltext Access 8 Pages 2006
Forensic analysis of System Restore points in Microsoft Windows XP
Fulltext Access 8 Pages 2006
Improving evidence acquisition from live network sources
Fulltext Access 8 Pages 2006
An empirical study of automatic event reconstruction systems
Fulltext Access 8 Pages 2006
FORZA – Digital forensics investigation framework that incorporate legal issues
Fulltext Access 8 Pages 2006
Maximum efficiency of flexible AC transmission systems
Fulltext Access 8 Pages 2006
Task allocation for maximizing reliability of distributed systems: A simulated annealing approach
Fulltext Access 8 Pages 2006
Virtual Leashing: Creating a computational foundation for software protection
Fulltext Access 8 Pages 2006
The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems
Fulltext Access 8 Pages 2006
Enabling PVM to exploit the SCTP protocol
Fulltext Access 8 Pages 2006
Parallelization of a level set method for simulating dendritic growth
Fulltext Access 8 Pages 2006
Fast distributed algorithm for convergecast in ad hoc geometric radio networks
Fulltext Access 8 Pages 2006
A fast localized algorithm for scheduling sensors
Fulltext Access 8 Pages 2006
Greedy localized routing for maximizing probability of delivery in wireless ad hoc networks with a realistic physical layer
Fulltext Access 8 Pages 2006
Assessing the transmission service risk
Fulltext Access 8 Pages 2006
Reconfiguration of distribution system using fuzzy multi-objective approach
Fulltext Access 8 Pages 2006
Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
Fulltext Access 8 Pages 2006
Time-domain fault location algorithm for parallel transmission lines using unsynchronized currents
Fulltext Access 8 Pages 2006
Transmission project profitability including reliability optimization of bulk power systems
Fulltext Access 8 Pages 2006
Optimal distributed generation allocation for reliability, losses, and voltage improvement
Fulltext Access 8 Pages 2006
A study on the on-line measurement of transmission line impedances for improved relaying protection
Fulltext Access 8 Pages 2006
A robust H∞ power system stabilizer design using reduced-order models
Fulltext Access 8 Pages 2006
Electricity customer classification using frequency–domain load pattern data
Fulltext Access 8 Pages 2006
Analysis of subharmonic oscillations in a ferroresonant circuit
Fulltext Access 8 Pages 2006
Optimal coordinated PET and generator excitation control for power systems
Fulltext Access 8 Pages 2006
An architecture and development methodology for location-based services
Fulltext Access 8 Pages 2006
Utilisation of mobile handheld devices for care management at an Australian aged care facility
Fulltext Access 8 Pages 2006
Performance limitations of the MAC layer in 802.15.4 low rate WPAN
Fulltext Access 8 Pages 2006
Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks
Fulltext Access 8 Pages 2006
Survivable IP network realization in IP-over-WDM networks under overlay model
Fulltext Access 8 Pages 2006
Resource allocation for real-time and non-real-time traffic in wireless networks
Fulltext Access 8 Pages 2006
Cross-layer conditional retransmission for layered video streaming over cellular networks
Fulltext Access 8 Pages 2006
Study on the extensibility of video conferencing with speech mixing
Fulltext Access 8 Pages 2006
Experimenting with τ-AIMD over wireless asynchronous networks
Fulltext Access 8 Pages 2006
Performance optimization of an adaptive wireless push system in environments with locality of demand
Fulltext Access 8 Pages 2006
Broadcasting in all-output-port cube-connected cycles with distance-insensitive switching
Fulltext Access 8 Pages 2006
A comparison of epidemic algorithms in wireless sensor networks
Fulltext Access 8 Pages 2006
Rule-based automatic segmentation of color images
Fulltext Access 8 Pages 2006
Radio range adjustment for energy efficient wireless sensor networks
Fulltext Access 8 Pages 2006
Computing nearest neighbors in real time
Fulltext Access 8 Pages 2006
Component value selection for active filters using parallel tabu search algorithm
Fulltext Access 8 Pages 2006
Frequency-domain model reduction approach to design IIR digital filters using orthonormal bases
Fulltext Access 8 Pages 2006
A multi-class fluid model for a contact center with skill-based routing
Fulltext Access 8 Pages 2006
Interference suppression by element position control of phased arrays using LM algorithm
Fulltext Access 8 Pages 2006
Genetic algorithm for delay- and degree-constrained multimedia broadcasting on overlay networks
Fulltext Access 8 Pages 2006
Novel first-order differential class-AB log-domain allpass filters
Fulltext Access 8 Pages 2006
A method for the analysis of transistor circuits having multiple DC solutions
Fulltext Access 8 Pages 2006
New frequency-dependent parametric modeling of dielectric materials
Fulltext Access 8 Pages 2006
An improved particle swarm optimization algorithm for unit commitment
Fulltext Access 9 Pages 2006
Value-based distribution feeder automation planning
Fulltext Access 9 Pages 2006
Study of climatic effects on peak load and regional similarity of load profiles following disturbances based on data mining
Fulltext Access 9 Pages 2006
Factors affecting customer needs of geographical accessibility in electronic commerce
Fulltext Access 9 Pages 2006
Web service decomposition: Edge computing architecture for cache-friendly e-commerce applications
Fulltext Access 9 Pages 2006
Havana agents for comparison shopping and location-aware advertising in wireless mobile environments
Fulltext Access 9 Pages 2006
Development of a tool for selecting mobile shopping site: A customer perspective
Fulltext Access 9 Pages 2006
<< < 352 353 354 355 356 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities