• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

Data acquisition in power systems and its digital processing for measurement and automation
Fulltext Access 7 Pages 2005
Migratable sockets in cluster computing
Fulltext Access 7 Pages 2005
Using P2P sharing activity to improve business decision making: proof of concept for estimating product life-cycle
Fulltext Access 7 Pages 2005
Computerized recognition of Alzheimer disease-EEG using genetic algorithms and neural network
Fulltext Access 7 Pages 2005
Oh behave! Agent-based behavioral representations in problem solving environments
Fulltext Access 7 Pages 2005
Biological sequence alignment on the computational grid using the GrADS framework
Fulltext Access 7 Pages 2005
Privacy-enhancing technologies for the world wide web
Fulltext Access 7 Pages 2005
The enhanced staircase broadcasting for VBR videos
Fulltext Access 7 Pages 2005
Movement detection delay analysis in mobile IP
Fulltext Access 7 Pages 2005
Assessment of objective voice quality over best-effort networks
Fulltext Access 7 Pages 2005
Adaptive packet marking for achieving fairness in DiffServ networks
Fulltext Access 7 Pages 2005
A low overhead encapsulation method for MF-TDMA
Fulltext Access 7 Pages 2005
An ID-based multisignature scheme without reblocking and predetermined signing order
Fulltext Access 7 Pages 2005
Recent attacks on alleged SecurID and their practical implications
Fulltext Access 7 Pages 2005
Modeling, specification and verification of ad-hoc sensor networks using SPIN
Fulltext Access 7 Pages 2005
ScatterWeb: A wireless sensornet platform for research and teaching
Fulltext Access 7 Pages 2005
Can critical infrastructures rely on the Internet?
Fulltext Access 7 Pages 2005
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
Fulltext Access 7 Pages 2005
Information security obedience: a definition
Fulltext Access 7 Pages 2005
Improvements on the WTLS protocol to avoid denial of service attacks
Fulltext Access 7 Pages 2005
Next-generation intrusion prevention: Accounting for the attack timeline
Fulltext Access 7 Pages 2005
Tracking USB storage: Analysis of windows artifacts generated by USB storage devices
Fulltext Access 7 Pages 2005
Infection dynamics on the Internet
Fulltext Access 7 Pages 2005
Compliance concentrates the mind
Fulltext Access 7 Pages 2005
Case study: A failure in success' clothing
Fulltext Access 7 Pages 2005
Case study: Network intrusion investigation - lessons in forensic preparation
Fulltext Access 7 Pages 2005
Criminal profiling and insider cyber crime
Fulltext Access 7 Pages 2005
An assessment of systems and software engineering scholars and institutions (1999-2003)
Fulltext Access 7 Pages 2005
Automated support for service-based software development and integration
Fulltext Access 7 Pages 2005
Performance of different simple linearizing techniques in SiGe LNA at 1900 MHz
Fulltext Access 7 Pages 2005
IEC class 0.5 electronic watt-hour meter implemented with first-order sigma-delta converters
Fulltext Access 7 Pages 2005
The Laws of Vulnerabilities: Which security vulnerabilities really matter?
Fulltext Access 7 Pages 2005
CMOS RF switched capacitor bandpass filter tuned by ring VCO
Fulltext Access 7 Pages 2005
Radiation loss and mode field distribution in curved holey fibers
Fulltext Access 7 Pages 2005
A new method for adaptive IIR filter design based on tabu search algorithm
Fulltext Access 7 Pages 2005
A simple generalized neuro-fuzzy operator for efficient removal of impulse noise from highly corrupted digital images
Fulltext Access 7 Pages 2005
The peak-constrained optimization of stable linear-phase IIR PRQMF bank
Fulltext Access 7 Pages 2005
Algorithms for ad hoc and sensor networks
Fulltext Access 7 Pages 2005
Fuzzy logic controller in interconnected electrical power systems for load-frequency control
Fulltext Access 8 Pages 2005
Temperature-independent fiber Bragg grating strain sensor using bimetal cantilever
Fulltext Access 8 Pages 2005
A Petri-net based distributed monitoring system using PIC microcontrollers
Fulltext Access 8 Pages 2005
Optimal broadcasting on incomplete star graph interconnection networks
Fulltext Access 8 Pages 2005
Methods of discovery and exploitation of Host Protected Areas on IDE storage devices that conform to ATAPI-4
Fulltext Access 8 Pages 2005
Utilization of time varying event-based customer interruption cost load shedding schemes
Fulltext Access 8 Pages 2005
Authorisation in Grid computing
Fulltext Access 8 Pages 2005
An improved voltage stability index and its application
Fulltext Access 8 Pages 2005
A modified hybrid EP-SQP approach for dynamic dispatch with valve-point effect
Fulltext Access 8 Pages 2005
Real-time intrusion detection for high-speed networks
Fulltext Access 8 Pages 2005
Transfer of transient surge voltage through XLPE cable winding transformer (Dryformer) circuits
Fulltext Access 8 Pages 2005
Security views
Fulltext Access 8 Pages 2005
An auction game model for pool-based electricity markets
Fulltext Access 8 Pages 2005
Generalizing sources of live network evidence
Fulltext Access 8 Pages 2005
Security in the Semantic Web using OWL
Fulltext Access 8 Pages 2005
Local linear approximation for tracking frequency in power systems
Fulltext Access 8 Pages 2005
Effects of dispersion on nonlinearity measurement of optical fibers
Fulltext Access 8 Pages 2005
Matching optical fiber lifetime and bend-loss limits for optimized local loop fiber storage
Fulltext Access 8 Pages 2005
Tunable dispersion compensation with fixed center wavelength and bandwidth using a side-polished linearly chirped fiber Bragg grating
Fulltext Access 8 Pages 2005
40 Gbit/s packet bit error ratio and loss real-time measurement for ultrahigh-speed packet switched network
Fulltext Access 8 Pages 2005
Virtual loops in power-equalized transparent DWDM networks
Fulltext Access 8 Pages 2005
Probabilistic power flow with non-conforming electric loads
Fulltext Access 8 Pages 2005
Software requirement understanding using Pathfinder networks: discovering and evaluating mental models
Fulltext Access 8 Pages 2005
Developing and using a web-based project process throughout the software engineering curriculum
Fulltext Access 8 Pages 2005
Integrating formalism into undergraduate software engineering
Fulltext Access 8 Pages 2005
An empirical investigation of the impact of the object-oriented paradigm on the maintainability of real-world mission-critical software
Fulltext Access 8 Pages 2005
On-line prediction of software reliability using an evolutionary connectionist model
Fulltext Access 8 Pages 2005
Towards modeling and evaluation of ETCS real-time communication and operation
Fulltext Access 8 Pages 2005
Worst case constant time priority queue
Fulltext Access 8 Pages 2005
A novel image watermarking scheme based on support vector regression
Fulltext Access 8 Pages 2005
Software failure prediction based on a Markov Bayesian network model
Fulltext Access 8 Pages 2005
Scheduling of cogeneration plants considering electricity wheeling using enhanced immune algorithm
Fulltext Access 8 Pages 2005
The SEI curriculum modules and their influence: Norm Gibbs' legacy to software engineering education
Fulltext Access 8 Pages 2005
The extended security perimeter
Fulltext Access 8 Pages 2005
A generic anti-spyware solution by access control list at kernel level
Fulltext Access 8 Pages 2005
Incorporation of middleware and grid technologies to enhance usability in Computational Chemistry applications
Fulltext Access 8 Pages 2005
Executing and observing CFD applications on the Grid
Fulltext Access 8 Pages 2005
Application of Grid-enabled technologies for solving optimization problems in data-driven reservoir studies
Fulltext Access 8 Pages 2005
“Applications on demand” as the exploitation of the Migrating Desktop
Fulltext Access 8 Pages 2005
Workflow composer and service registry for grid applications
Fulltext Access 8 Pages 2005
Novel mediator architectures for Grid information systems
Fulltext Access 8 Pages 2005
JavaSymphony, a programming model for the Grid
Fulltext Access 8 Pages 2005
An efficient incremental marshaling framework for distributed systems
Fulltext Access 8 Pages 2005
Partitioning finite element meshes using space-filling curves
Fulltext Access 8 Pages 2005
Automatic differentiation and nonlinear controller design by exact linearization
Fulltext Access 8 Pages 2005
Looking for narrow interfaces in automatic differentiation using graph drawing
Fulltext Access 8 Pages 2005
MPI for Python
Fulltext Access 8 Pages 2005
Notes from the field: Implementing a security solution for Web Services
Fulltext Access 8 Pages 2005
Optimal VAR dispatch using a multiobjective evolutionary algorithm
Fulltext Access 8 Pages 2005
Frequency domain transient analysis of electrical networks including non-linear conditions
Fulltext Access 8 Pages 2005
Optimization of a secondary power distribution system
Fulltext Access 8 Pages 2005
Identification of synchronous generators using adaptive wavelet networks
Fulltext Access 8 Pages 2005
On centralized power pool auction: a novel multipliers stabilization procedure
Fulltext Access 8 Pages 2005
A trust region interior point algorithm for optimal power flow problems
Fulltext Access 8 Pages 2005
A distributed systems approach to secure Internet mail
Fulltext Access 8 Pages 2005
Trojan defence: A forensic view
Fulltext Access 8 Pages 2005
Security views: Malware Update
Fulltext Access 8 Pages 2005
Dealing with packet loss in the Interactive Chained Stream Authentication protocol
Fulltext Access 8 Pages 2005
Web services: Developers dream or hackers heaven?
Fulltext Access 8 Pages 2005
Ancillary reactive power service allocation cost in deregulated markets: a methodology
Fulltext Access 8 Pages 2005
A simulation model for AGC studies of hydro-hydro systems
Fulltext Access 8 Pages 2005
A power system control scheme based on security visualisation in parameter space
Fulltext Access 8 Pages 2005
<< < 367 368 369 370 371 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities