• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

AVDL: A highly adaptable architecture view description language
Fulltext Access 27 Pages 2006
Real-time data attack isolation for commercial database applications
Fulltext Access 27 Pages 2006
An efficient quality-of-service MAC protocol for infrastructure WLANs
Fulltext Access 27 Pages 2006
Multicast protocols for scalable on-demand download
Fulltext Access 28 Pages 2006
Developing context-aware pervasive computing applications: Models and approach
Fulltext Access 28 Pages 2006
Origin authentication in interdomain routing
Fulltext Access 28 Pages 2006
M/G/1 queue with multiple working vacations
Fulltext Access 28 Pages 2006
Relevance of massively distributed explorations of the Internet topology: Qualitative results
Fulltext Access 28 Pages 2006
Quantitative performance comparison of different content distribution modes
Fulltext Access 28 Pages 2006
The parallel optimization of network bandwidth allocation based on generalized particle model
Fulltext Access 28 Pages 2006
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Fulltext Access 28 Pages 2006
An energy efficient security protocol for IEEE 802.11 WLANs
Fulltext Access 28 Pages 2006
Performance of two-stage tandem queues with blocking: The impact of several flows of signals
Fulltext Access 29 Pages 2006
Stronger interaction between link layer and network layer for an optimized mobility management in heterogeneous IPv6 networks
Fulltext Access 29 Pages 2006
Closed form solutions for mapping general distributions to quasi-minimal PH distributions
Fulltext Access 29 Pages 2006
The integration of ad hoc sensor and cellular networks for multi-class data transmission
Fulltext Access 29 Pages 2006
On the performance of ad hoc wireless LANs: A practical queuing theoretic model
Fulltext Access 30 Pages 2006
A customer threshold property for closed finite queueing networks
Fulltext Access 30 Pages 2006
Performance evaluation of the push-mode-multicast based candidate access router discovery (PMM CARD)
Fulltext Access 31 Pages 2006
SimQPN—A tool and methodology for analyzing queueing Petri net models by means of simulation
Fulltext Access 31 Pages 2006
Logic and stochastic modeling with S m A r T
Fulltext Access 31 Pages 2006
Two methods for computing bounds for the distribution of cumulative reward for large Markov models
Fulltext Access 31 Pages 2006
Service discovery using volunteer nodes in heterogeneous pervasive computing environments
Fulltext Access 31 Pages 2006
Tight end-to-end per-flow delay bounds in FIFO multiplexing sink-tree networks
Fulltext Access 32 Pages 2006
A page fault equation for modeling the effect of memory size
Fulltext Access 32 Pages 2006
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
Fulltext Access 33 Pages 2006
Context-aware resource management in multi-inhabitant smart homes: A framework based on Nash HH-learning
Fulltext Access 33 Pages 2006
Medium Access Control protocols for ad hoc wireless networks: A survey
Fulltext Access 33 Pages 2006
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
Fulltext Access 35 Pages 2006
Using B SP and Python to simplify parallel programming
Fulltext Access 35 Pages 2006
Using CORBA middleware in finite element software
Fulltext Access 36 Pages 2006
Decentralized media streaming infrastructure (DeMSI): An adaptive and high-performance peer-to-peer content delivery network
Fulltext Access 36 Pages 2006
Embedding expression: Pervasive computing architecture for art and entertainment
Fulltext Access 36 Pages 2006
Survey of research towards robust peer-to-peer networks: Search methods
Fulltext Access 37 Pages 2006
A framework and source model for design and evaluation of Robust Header Compression
Fulltext Access 37 Pages 2006
Polygonal broadcast, secret maturity, and the firing sensors
Fulltext Access 40 Pages 2006
Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions
Fulltext Access 42 Pages 2006
On multicasting in wavelength-routing mesh networks
Fulltext Access 60 Pages 2006
Gearing up for grid computing
Fulltext Access 4 Pages 2005
Comments on two anonymous conference key distribution systems
Fulltext Access 4 Pages 2005
Trojan defence: A forensic view part II
Fulltext Access 4 Pages 2005
Trusted computing and forensic investigations
Fulltext Access 4 Pages 2005
Multiplexer-based double-exponentiation for normal basis of GF(2m)
Fulltext Access 4 Pages 2005
The economic approach of information security
Fulltext Access 4 Pages 2005
The Internet is the computer: The role of forensics in bridging the digital and physical divide
Fulltext Access 4 Pages 2005
Malware analysis for windows administrators
Fulltext Access 4 Pages 2005
News
Fulltext Access 4 Pages 2005
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05)
Fulltext Access 4 Pages 2005
Smart card based authentication - any future?
Fulltext Access 4 Pages 2005
Improved remote authentication scheme with smart card
Fulltext Access 4 Pages 2005
Protection for software in measuring instruments
Fulltext Access 4 Pages 2005
Comments on a cryptographic key assignment scheme
Fulltext Access 4 Pages 2005
Consultants wave integration flag
Fulltext Access 4 Pages 2005
News in brief
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Trusted computing group history
Fulltext Access 4 Pages 2005
VPN boom bewilders users
Fulltext Access 4 Pages 2005
Product roundup
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys
Fulltext Access 4 Pages 2005
Time jitter analysis of 1-bit sigma-delta synthesizer
Fulltext Access 4 Pages 2005
Why 'Phish' when you can Trawl?
Fulltext Access 4 Pages 2005
DXCCII-based tunable gyrator
Fulltext Access 4 Pages 2005
Diffraction by a rectangular groove with resistive walls
Fulltext Access 4 Pages 2005
New FTFN-based grounded-capacitor SRCO with explicit current-mode output and reduced number of resistors
Fulltext Access 4 Pages 2005
On Onsager relations and linear electromagnetic materials
Fulltext Access 4 Pages 2005
Note on the asymptotic approximation of a double integral with an angular-spectrum representation
Fulltext Access 4 Pages 2005
On coded modulation using LDPC convolutional codes
Fulltext Access 4 Pages 2005
A decision aided channel estimation scheme
Fulltext Access 4 Pages 2005
One of the gang
Fulltext Access 4 Pages 2005
Approximate symbol error probability evaluation of M-ary pulse amplitude modulation with imperfect carrier recovery
Fulltext Access 4 Pages 2005
The circuit realization of Mexican Hat wavelet function
Fulltext Access 4 Pages 2005
Size-dependent Bruggeman approach for dielectric-magnetic composite materials
Fulltext Access 4 Pages 2005
Closed-form SER expressions for Star MQAM in frequency non-selective Rician and Nakagami-m channels
Fulltext Access 4 Pages 2005
Current conveyor based electrometer
Fulltext Access 4 Pages 2005
Current mode multifunction filter using two CDBAs
Fulltext Access 4 Pages 2005
New modulation scheme based on elliptic functions
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Guest editorial
Fulltext Access 4 Pages 2005
Design and performance of networks for super-, cluster-, and grid-computing: Part I
Fulltext Access 4 Pages 2005
Design and performance of networks for super-, cluster-, and grid-computing: Part II
Fulltext Access 4 Pages 2005
Special section: “Soft-computing and advanced techniques in new algorithmic approaches to existing application areas”
Fulltext Access 4 Pages 2005
High-speed networks and services for data-intensive Grids: The DataTAG Project
Fulltext Access 4 Pages 2005
Introduction
Fulltext Access 4 Pages 2005
Performance modeling and evaluation of high-performance parallel and distributed systems
Fulltext Access 4 Pages 2005
Recent advances in computer vision and image processing using reconfigurable hardware
Fulltext Access 4 Pages 2005
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
Fulltext Access 4 Pages 2005
Guide for Authors
Fulltext Access 4 Pages 2005
Wireless IP through integration of wireless LAN and cellular networks
Fulltext Access 4 Pages 2005
Improvement on the flexible tree-based key management framework
Fulltext Access 5 Pages 2005
Information Security Governance - Compliance management vs operational management
Fulltext Access 5 Pages 2005
Timing is everything
Fulltext Access 5 Pages 2005
The future of forensic computing
Fulltext Access 5 Pages 2005
Cryptanalyses of two key assignment schemes based on polynomial interpolations
Fulltext Access 5 Pages 2005
<< < 365 366 367 368 369 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities