• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

A new scalable optimal topology for multi-hop optical networks
Fulltext Access 14 Pages 2005
Aligned prefix caching based on singleton information
Fulltext Access 14 Pages 2005
Level compressed DAGs for lookup tables
Fulltext Access 14 Pages 2005
The notion of end-to-end capacity and its application to the estimation of end-to-end network delays
Fulltext Access 14 Pages 2005
Multiplayer networked gaming with the session initiation protocol
Fulltext Access 14 Pages 2005
Future active Ip networks security architecture
Fulltext Access 14 Pages 2005
Optimizing content distribution through adaptive distributed caching
Fulltext Access 14 Pages 2005
Model checking active networks with SPIN
Fulltext Access 14 Pages 2005
Adjustable broadcast protocol for large-scale near-video-on-demand systems
Fulltext Access 14 Pages 2005
The 'pure-IP' Moby Dick 4G architecture
Fulltext Access 14 Pages 2005
Distributed multichannel MAC protocol for IEEE 802.11 ad hoc wireless LANs
Fulltext Access 14 Pages 2005
Minimization of Haar wavelet series and Haar spectral decision diagrams for discrete functions
Fulltext Access 14 Pages 2005
Delay-based early congestion detection and adaptation in TCP: impact on web performance
Fulltext Access 14 Pages 2005
Fair and efficient packet scheduling algorithms for multiple classes of service under QoS guarantee in UMTS
Fulltext Access 14 Pages 2005
A proactive approach towards always-on availability in broadband cable networks
Fulltext Access 14 Pages 2005
A self-adaptive zone routing protocol for Bluetooth scatternets
Fulltext Access 14 Pages 2005
Scalability improvement of the real time control protocol
Fulltext Access 14 Pages 2005
Performance of wireless networks with hidden nodes: a queuing-theoretic analysis
Fulltext Access 14 Pages 2005
Physical layer impact on the design and performance of routing and broadcasting protocols in ad hoc and sensor networks
Fulltext Access 14 Pages 2005
Maintaining weakly-connected dominating sets for clustering ad hoc networks
Fulltext Access 14 Pages 2005
An ad hoc networking scheme in hybrid networks for emergency communications
Fulltext Access 14 Pages 2005
OLSR performance measurement in a military mobile ad hoc network
Fulltext Access 14 Pages 2005
An infrastructure for designing custom embedded wide counterflow pipelines
Fulltext Access 14 Pages 2005
Simulating autonomous agents in augmented reality
Fulltext Access 14 Pages 2005
ECEM: an event correlation based event manager for an I/O-intensive application
Fulltext Access 14 Pages 2005
Multi-disk scheduling for time-constrained requests in RAID-0 devices
Fulltext Access 14 Pages 2005
Fair scheduling of dynamic task systems on multiprocessors
Fulltext Access 14 Pages 2005
Robust scheduling in team-robotics
Fulltext Access 14 Pages 2005
Teaching extreme programming to large groups of students
Fulltext Access 14 Pages 2005
Performance analysis of software reliability growth models with testing-effort and change-point
Fulltext Access 14 Pages 2005
Automatic protection switching for p-cycles in WDM networks
Fulltext Access 14 Pages 2005
A call admission control for service differentiation and fairness management in WDM grooming networks
Fulltext Access 14 Pages 2005
Survivable routing in IP-over-WDM networks: An efficient and scalable local search algorithm
Fulltext Access 14 Pages 2005
Splitting and merging of packet traffic: Measurement and modelling
Fulltext Access 14 Pages 2005
Multiprocessor SoPC-Core for FAT volume computation
Fulltext Access 14 Pages 2005
A broad view on overspill routing in optical networks: a real synthesis of packet and circuit switching?
Fulltext Access 14 Pages 2005
Penalties due to the combined effects of amplitude noise and timing-jitter with application to a 40 Gbit/s DM-soliton system
Fulltext Access 14 Pages 2005
Bound states of plain and composite pulses: Multi-soliton solutions
Fulltext Access 14 Pages 2005
W-type fiber design for application in U- and S-band amplifiers by controlling the LP01 mode long wavelength cut-off
Fulltext Access 14 Pages 2005
Performance improvement of dynamic buffered ATM switch
Fulltext Access 14 Pages 2005
Security-enabled code deployment for heterogeneous networks
Fulltext Access 14 Pages 2005
Advances in automotive digital communications
Fulltext Access 14 Pages 2005
Policy support for H.323 call handling
Fulltext Access 14 Pages 2005
The DataTAG transatlantic testbed
Fulltext Access 14 Pages 2005
Enforcing in-order packet delivery in system area networks with adaptive routing
Fulltext Access 14 Pages 2005
The impact of spatial layout of jobs on I/O hotspots in mesh networks
Fulltext Access 14 Pages 2005
Dynamic probabilistic broadcasting in MANETs
Fulltext Access 14 Pages 2005
An adaptive scheme for fault-tolerant scheduling of soft real-time tasks in multiprocessor systems
Fulltext Access 14 Pages 2005
Adaptive schemes for distributed web caching
Fulltext Access 14 Pages 2005
From virtualized resources to virtual computing grids: the In-VIGO system
Fulltext Access 14 Pages 2005
The JXTA performance model and evaluation
Fulltext Access 14 Pages 2005
Visualisation of fuzzy systems: requirements, techniques and framework
Fulltext Access 14 Pages 2005
PYR: a Cellular Automata model for pyroclastic flows and application to the 1991 Mt. Pinatubo eruption
Fulltext Access 14 Pages 2005
Monitoring cache behavior on parallel SMP architectures and related programming tools
Fulltext Access 14 Pages 2005
A super-peer model for resource discovery services in large-scale Grids
Fulltext Access 14 Pages 2005
On advance reservation of heterogeneous network paths
Fulltext Access 14 Pages 2005
Fast and low-cost search schemes by exploiting localities in P2P networks
Fulltext Access 14 Pages 2005
America OnLine's Internet access service: how to deter unwanted customers
Fulltext Access 14 Pages 2005
The effects of shilling on final bid prices in online auctions
Fulltext Access 14 Pages 2005
P2P commercial digital content exchange
Fulltext Access 14 Pages 2005
Securing credit card transactions with one-time payment scheme
Fulltext Access 14 Pages 2005
The architecture and business value of a semi-cooperative, agent-based supply chain management system
Fulltext Access 14 Pages 2005
The impact of free and open source licensing on operating system software markets
Fulltext Access 14 Pages 2005
Mobile DRM--usability out the door?
Fulltext Access 14 Pages 2005
Movie piracy on peer-to-peer networks-the case of KaZaA
Fulltext Access 14 Pages 2005
Economics and copyright reform: aspects of the EC Directive
Fulltext Access 14 Pages 2005
Repeated results analysis for middleware regression benchmarking
Fulltext Access 14 Pages 2005
Performance evaluation of parallel iterative deepening A* on clusters of workstations
Fulltext Access 14 Pages 2005
A dependability evaluation tool for the Internet of Things
Fulltext Access 14 Pages 2005
Tlib-a library to support programming with hierarchical multi-processor tasks
Fulltext Access 14 Pages 2005
Robust position-based routing for wireless ad hoc networks
Fulltext Access 14 Pages 2005
Experiences with optimizing two stream-based applications for cluster execution
Fulltext Access 14 Pages 2005
Minimizing mean flowtime and makespan on master-slave systems
Fulltext Access 14 Pages 2005
Locking without requesting a lock: A consistency maintenance mechanism in Internet-based real-time group editors
Fulltext Access 14 Pages 2005
Constructing regular variables in message passing systems
Fulltext Access 14 Pages 2005
Parallel implementation of a transportation network model
Fulltext Access 14 Pages 2005
On the effect of a configuration choice on the performance of a mirrored storage system
Fulltext Access 14 Pages 2005
Parallel multigrid summation for the N-body problem
Fulltext Access 14 Pages 2005
The mobile groups approach for the coordination of mobile agents
Fulltext Access 14 Pages 2005
Mutual exclusion in asynchronous systems with failure detectors
Fulltext Access 14 Pages 2005
An integer linear programming-based tool for wireless sensor networks
Fulltext Access 14 Pages 2005
Optimal task scheduling algorithm for cyclic synchronous tasks in general multiprocessor networks
Fulltext Access 14 Pages 2005
A fair scheduling algorithm with traffic classification for wireless networks
Fulltext Access 15 Pages 2005
Distributed multicast routing for delay and delay variation-bounded Steiner tree using simulated annealing
Fulltext Access 15 Pages 2005
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Fulltext Access 15 Pages 2005
Adaptive bandwidth provisioning with explicit respect to QoS requirements
Fulltext Access 15 Pages 2005
Allowing bit errors in speech over wireless LANs
Fulltext Access 15 Pages 2005
Performance analysis under finite load and improvements for multirate 802.11
Fulltext Access 15 Pages 2005
Performance improvements of integrating ad hoc operations into infrastructure IEEE 802.11 wireless local area networks
Fulltext Access 15 Pages 2005
Towards a Measurement Based Networking approach for Internet QoS improvement
Fulltext Access 15 Pages 2005
Access delay for nodes with finite buffers in IEEE 802.15.4 beacon enabled PAN with uplink transmissions
Fulltext Access 15 Pages 2005
A novel state cache scheme in structured P2P systems
Fulltext Access 15 Pages 2005
Receiver-initiated multiple access protocols for spread spectrum mobile ad hoc networks
Fulltext Access 15 Pages 2005
Efficient trigger-broadcasting in heterogeneous clusters
Fulltext Access 15 Pages 2005
Inter-domain QoS routing on Diffserv networks: a region-based approach
Fulltext Access 15 Pages 2005
VoD on steroids : Optimized content delivery using distributed video servers over best-effort Internet
Fulltext Access 15 Pages 2005
Design and performance analysis of multimedia document retrieval strategies for networked Video-on-Reservation systems
Fulltext Access 15 Pages 2005
Application of online-training SVMs for real-time intrusion detection with different considerations
Fulltext Access 15 Pages 2005
A bottom-up inference of loss rate
Fulltext Access 15 Pages 2005
A collision model for randomized routing in fat-tree networks
Fulltext Access 15 Pages 2005
<< < 374 375 376 377 378 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities