• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

MD5 collisions and the impact on computer forensics
Fulltext Access 5 Pages 2005
Study on a system frequency response model for a large industrial area load shedding
Fulltext Access 5 Pages 2005
To image a Macintosh
Fulltext Access 5 Pages 2005
Space-time codes for quaternary CPFSK systems with large number of receiver antennas
Fulltext Access 5 Pages 2005
Elimination of rotation axes offset error in antenna radiation pattern measurements using spherical wave expansion
Fulltext Access 5 Pages 2005
Effect of dormant registration on performance of mobility management based on IP paging in wireless data networks
Fulltext Access 5 Pages 2005
High impedance voltage- and current-mode multifunction filters
Fulltext Access 5 Pages 2005
Statistical cellular Gaussian scatter density channel model employing a directional antenna for mobile environments
Fulltext Access 5 Pages 2005
Digital provenance - interpretation, verification and corroboration
Fulltext Access 5 Pages 2005
Neural network based adaptable control method for linearization of high power amplifiers
Fulltext Access 5 Pages 2005
Formal methods, techniques and tools for secure and reliable applications
Fulltext Access 5 Pages 2005
Non-interactive deniable authentication protocol based on factoring
Fulltext Access 5 Pages 2005
Supporting the application of Situated Cellular Agents in non-uniform spaces
Fulltext Access 5 Pages 2005
Telecommunications and UML languages
Fulltext Access 5 Pages 2005
Parallel recognition algorithms for chordal_planar graphs and planar k-trees
Fulltext Access 5 Pages 2005
Gene transcript clustering: a comparison of parallel approaches
Fulltext Access 5 Pages 2005
Improved one-to-all broadcasting algorithms on faulty SIMD hypercubes
Fulltext Access 5 Pages 2005
Subject index to volume 21
Fulltext Access 5 Pages 2005
System reliability worth assessment at a midwest utility-survey results for residential customers
Fulltext Access 5 Pages 2005
Volume Indices - article, author, keyword
Fulltext Access 5 Pages 2005
The joys of complexity and the deleted file
Fulltext Access 5 Pages 2005
The Windows Registry as a forensic resource
Fulltext Access 5 Pages 2005
Logarithmic barrier-augmented Lagrangian function to the optimal power flow problem
Fulltext Access 5 Pages 2005
Volume contents 2005
Fulltext Access 5 Pages 2005
Biometrics: what are they good for?
Fulltext Access 5 Pages 2005
The unique challenges of collecting corporate evidence
Fulltext Access 5 Pages 2005
Fabrication of 128×128 element optical switch array by micromachining technology
Fulltext Access 5 Pages 2005
Examining the state of preparedness of Information Technology management in New Zealand for events that may require forensic analysis
Fulltext Access 5 Pages 2005
Data discovery algorithm for scientific data grid environment
Fulltext Access 6 Pages 2005
Acknowledgement to reviewers
Fulltext Access 6 Pages 2005
Packet-based scheduling algorithm for CIOQ switches with multiple traffic classes
Fulltext Access 6 Pages 2005
On stalling in LogP
Fulltext Access 6 Pages 2005
A pixel cache architecture with selective placement scheme based on z-test result
Fulltext Access 6 Pages 2005
Secure authentication scheme for session initiation protocol
Fulltext Access 6 Pages 2005
Author-Title Index for Volume
Fulltext Access 6 Pages 2005
Networks for sorting multitonic sequences
Fulltext Access 6 Pages 2005
An empirical study of system design instability metric and design evolution in an agile software process
Fulltext Access 6 Pages 2005
SCAN: A secure service directory for service-centric wireless sensor networks
Fulltext Access 6 Pages 2005
Efficient remote user authentication scheme using smart card
Fulltext Access 6 Pages 2005
On the security enhancement for anonymous secure e-voting over computer network
Fulltext Access 6 Pages 2005
New conference key agreement protocol with user anonymity
Fulltext Access 6 Pages 2005
A way to determine radiation-induced loss in fiber-optic digital communication link
Fulltext Access 6 Pages 2005
Cumulative Invited Paper Index for Volumes 1-11
Fulltext Access 6 Pages 2005
Information Security governance: COBIT or ISO 17799 or both?
Fulltext Access 6 Pages 2005
An improvement on efficient anonymous auction protocols
Fulltext Access 6 Pages 2005
The concept of security and trust in electronic payments
Fulltext Access 6 Pages 2005
On the security of some proxy blind signature schemes
Fulltext Access 6 Pages 2005
Why users cannot use security
Fulltext Access 6 Pages 2005
A randomized RSA-based partially blind signature scheme for electronic cash
Fulltext Access 6 Pages 2005
Intrusion Detection Systems and Intrusion Prevention Systems
Fulltext Access 6 Pages 2005
Unification of digital evidence from disparate sources (Digital Evidence Bags)
Fulltext Access 6 Pages 2005
Wavelet-based inverse halftoning for error diffused halftones
Fulltext Access 6 Pages 2005
Slack bus treatment in load flow solutions with uncertain nodal powers
Fulltext Access 6 Pages 2005
Parameter estimation of harmonic polluting industrial loads
Fulltext Access 6 Pages 2005
Asset management of wood pole utility structures
Fulltext Access 6 Pages 2005
Voltage control settings to increase wind power based on probabilistic load flow
Fulltext Access 6 Pages 2005
Author Index and Keyword Index for Vol 27, issues 1-10
Fulltext Access 6 Pages 2005
The coordinated control of SVC and excitation of generators in power systems with nonlinear loads
Fulltext Access 6 Pages 2005
Generating unit maintenance scheduling under competitive market environments
Fulltext Access 6 Pages 2005
Impulsive noise suppression from images with Jarque-Bera test based median filter
Fulltext Access 6 Pages 2005
Coplanar waveguide-fed slot antennas on cylindrical substrates
Fulltext Access 6 Pages 2005
Maximally selective generalized Chebyshev filters with asymmetrically located transmission zeros
Fulltext Access 6 Pages 2005
Secure key agreement protocols for three-party against guessing attacks
Fulltext Access 6 Pages 2005
Cryptanalysis of Xia-You group signature scheme
Fulltext Access 6 Pages 2005
Implementation of a modified Fuzzy C-Means clustering algorithm for real-time applications
Fulltext Access 6 Pages 2005
A pipelined array architecture for Euclidean distance transformation and its FPGA implementation
Fulltext Access 6 Pages 2005
A cost-optimal parallel implementation of a tridiagonal system solver using skeletons
Fulltext Access 6 Pages 2005
Towards OGSA compatibility in the H2O metacomputing framework
Fulltext Access 6 Pages 2005
Development of efficient computational kernels and linear algebra routines for out-of-order superscalar processors
Fulltext Access 6 Pages 2005
Parallel computing for globally optimal decision making on cluster systems
Fulltext Access 6 Pages 2005
DRAxML@home: a distributed program for computation of large phylogenetic trees
Fulltext Access 6 Pages 2005
An efficient VLSI implementation of IDEA encryption algorithm using VHDL
Fulltext Access 7 Pages 2005
Determination of PSS location based on singular value decomposition
Fulltext Access 7 Pages 2005
Impact of time-varying failure rates on distribution reliability
Fulltext Access 7 Pages 2005
Novel architecture for QAM modulator-demodulator and its generalization to multicarrier modulation
Fulltext Access 7 Pages 2005
Microprocessor-based FPGA implementation of SPIHT image compression subsystems
Fulltext Access 7 Pages 2005
Decoupled substation reliability assessment
Fulltext Access 7 Pages 2005
A comparison-based diagnosis algorithm tailored for crossed cube multiprocessor systems
Fulltext Access 7 Pages 2005
A robust damping controller for SMES using loop-shaping technique
Fulltext Access 7 Pages 2005
The instruction register file micro-architecture
Fulltext Access 7 Pages 2005
Solving multidimensional 0-1 knapsack problem by P systems with input and active membranes
Fulltext Access 7 Pages 2005
Design of FBG-based ultra-narrow asymmetric filter for transmission with 0.8 bit/s/Hz spectral efficiency without polarisation multiplexing
Fulltext Access 7 Pages 2005
Nonlinear model for ECG R-R interval variation using genetic programming approach
Fulltext Access 7 Pages 2005
An interpretation of neural networks as inference engines with application to transformer failure diagnosis
Fulltext Access 7 Pages 2005
Self-organizing multivariate constrained meta-modeling technique for passive microwave and RF components
Fulltext Access 7 Pages 2005
A neural power system stabilizer trained using local linear controllers in a gain-scheduling scheme
Fulltext Access 7 Pages 2005
Enhancing wildland fire prediction on cluster systems applying evolutionary optimization techniques
Fulltext Access 7 Pages 2005
Power flow and loss allocation for deregulated transmission systems
Fulltext Access 7 Pages 2005
A neural space vector fault location for parallel double-circuit distribution lines
Fulltext Access 7 Pages 2005
A simulated annealing-based goal-attainment method for economic emission load dispatch of fixed head hydrothermal power systems
Fulltext Access 7 Pages 2005
A novel approach based on global positioning system for parallel load flow analysis
Fulltext Access 7 Pages 2005
Transmission expansion cost allocation based on cooperative game theory for congestion relief
Fulltext Access 7 Pages 2005
A Channel Memory based fault tolerance for MPI applications
Fulltext Access 7 Pages 2005
Correspondence between mutation and selection pressure and the genetic code degeneracy in the gene evolution
Fulltext Access 7 Pages 2005
Packet routing and selection on the POPS network
Fulltext Access 7 Pages 2005
Retargetable code generation for application-specific processors
Fulltext Access 7 Pages 2005
The Josephus Cube: analysis of routing and fault tolerance
Fulltext Access 7 Pages 2005
A static analysis for Bulk Synchronous Parallel ML to avoid parallel nesting
Fulltext Access 7 Pages 2005
The Cambridge CFD grid for large-scale distributed CFD applications
Fulltext Access 7 Pages 2005
Rule-based visualization in the Discover computational steering collaboratory
Fulltext Access 7 Pages 2005
<< < 366 367 368 369 370 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities