• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

IPv6: business applications and implementation concerns
Fulltext Access 15 Pages 2005
Keyjacking: the surprising insecurity of client-side SSL
Fulltext Access 15 Pages 2005
Query-directed passwords
Fulltext Access 15 Pages 2005
A novel formal verification approach for RTL hardware IP cores
Fulltext Access 15 Pages 2005
Applying genetic algorithm for the development of the components-based embedded system
Fulltext Access 15 Pages 2005
Information systems security policies: a contextual perspective
Fulltext Access 15 Pages 2005
A quad-tree based algorithm for processor allocation in 2D mesh-connected multicomputers
Fulltext Access 15 Pages 2005
Password authenticated key exchange protocols among diverse network domains
Fulltext Access 15 Pages 2005
Standardized languages for telecommunication systems
Fulltext Access 15 Pages 2005
Private key infrastructure: balancing computer transmission privacy with changing technology and security demands
Fulltext Access 15 Pages 2005
Towards weak sequencing for E-LOTOS
Fulltext Access 15 Pages 2005
Management of risk in the information age
Fulltext Access 15 Pages 2005
Mobility and quality of service across heterogeneous wireless networks
Fulltext Access 15 Pages 2005
Precomputation for intra-domain QoS routing
Fulltext Access 15 Pages 2005
A mathematical analysis of the cumulus pricing scheme
Fulltext Access 15 Pages 2005
Distributed routing algorithms for multi-hop ad hoc networks using d-hop connected d-dominating sets
Fulltext Access 15 Pages 2005
Basic protocols, message sequence charts, and the verification of requirements specifications
Fulltext Access 15 Pages 2005
Routing demands with time-varying bandwidth profiles on a MPLS network
Fulltext Access 15 Pages 2005
The CODIS Content Delivery Network
Fulltext Access 15 Pages 2005
Cross-layer reliability management for multicast over satellite
Fulltext Access 15 Pages 2005
A lightweight encapsulation protocol for IP over MPEG-2 networks: design, implementation and analysis
Fulltext Access 15 Pages 2005
Recovery from control plane failures in the LDP signalling protocol
Fulltext Access 15 Pages 2005
Workflow analysis for web publishing using a stage-activity process model
Fulltext Access 15 Pages 2005
Relevance feedback using adaptive clustering for image similarity retrieval
Fulltext Access 15 Pages 2005
Distributed multiple selection algorithm for peer-to-peer systems
Fulltext Access 15 Pages 2005
Model driven generation and testing of object-relational mappings
Fulltext Access 15 Pages 2005
Some successful approaches to software reliability modeling in industry
Fulltext Access 15 Pages 2005
A middleware service for secure group communication in mobile ad hoc networks
Fulltext Access 15 Pages 2005
Bridging digital divide: Efforts in India
Fulltext Access 15 Pages 2005
Can the WSIS declaration principle and plan of action work in Japan? Digital stratification of Japanese society
Fulltext Access 15 Pages 2005
Physical layer performance benchmarking of two metropolitan area network configurations
Fulltext Access 15 Pages 2005
Characterization of optical fibers for optimization of a Brillouin scattering based fiber optic sensor
Fulltext Access 15 Pages 2005
De-Perimeterisation: Benefits and limitations
Fulltext Access 15 Pages 2005
Dynamic routing and wavelength assignment with optical bypass using ring embeddings
Fulltext Access 15 Pages 2005
Stress birefringence analysis of polarization maintaining optical fibers
Fulltext Access 15 Pages 2005
The use of a figure-of-eight coil for fibre optic respiratory plethysmography: Geometrical analysis and experimental characterisation
Fulltext Access 15 Pages 2005
The impact of x86 instruction set architecture on superscalar processing
Fulltext Access 15 Pages 2005
Compatibility, competition, and control in trusted computing environments
Fulltext Access 15 Pages 2005
Run-time analysis of time-critical systems
Fulltext Access 15 Pages 2005
Profiling soft-core processor applications for hardware/software partitioning
Fulltext Access 15 Pages 2005
Generalized parallel divide and conquer on 3D mesh and torus
Fulltext Access 15 Pages 2005
Data mining and machine learning-Towards reducing false positives in intrusion detection
Fulltext Access 15 Pages 2005
Managing commitments in multiple concurrent negotiations
Fulltext Access 15 Pages 2005
Diffusion and success factors of mobile marketing
Fulltext Access 15 Pages 2005
Grid load balancing using intelligent agents
Fulltext Access 15 Pages 2005
Very large Bayesian multinets for text classification
Fulltext Access 15 Pages 2005
User hints: a framework for interactive optimization
Fulltext Access 15 Pages 2005
DRMS, TCP and the EUCD: technology and law
Fulltext Access 15 Pages 2005
P2P contracts: a framework for resource and service exchange
Fulltext Access 15 Pages 2005
DINCast: a hop efficient dynamic multicast infrastructure for P2P computing
Fulltext Access 15 Pages 2005
Message-based cellular peer-to-peer grids: foundations for secure federation and autonomic services
Fulltext Access 15 Pages 2005
A social interaction analysis methodology for improving E-collaboration over the Internet
Fulltext Access 15 Pages 2005
A new cache document replacement policy considering the contribution to sales
Fulltext Access 15 Pages 2005
File-sharing-fight, ignore or compete
Fulltext Access 15 Pages 2005
Integration of streaming services and TCP data transmission in the Internet
Fulltext Access 15 Pages 2005
Performance analysis of dynamic load balancing algorithms with variable number of processors
Fulltext Access 15 Pages 2005
Evaluating scheduling policies for fine-grain communication protocols on a cluster of SMPs
Fulltext Access 15 Pages 2005
High quantile estimation for heavy-tailed distributions
Fulltext Access 15 Pages 2005
Wireless real-time on-demand data broadcast scheduling with dual deadlines
Fulltext Access 15 Pages 2005
Adaptive interpiconet scheduling for multipurpose scatternet scenarios
Fulltext Access 15 Pages 2005
Unreliable sensor grids: coverage, connectivity and diameter
Fulltext Access 15 Pages 2005
Topology and mobility considerations in mobile ad hoc networks
Fulltext Access 15 Pages 2005
Fluid queues to solve jump processes
Fulltext Access 15 Pages 2005
Approximate solutions for heavily loaded Markov-modulated queues
Fulltext Access 15 Pages 2005
Delay analysis of downlink IP traffic on UMTS mobile networks
Fulltext Access 15 Pages 2005
Statistical modelling of information sharing: Community, membership, and content
Fulltext Access 15 Pages 2005
Preventing information leakage within workflows that execute among competing organizations
Fulltext Access 15 Pages 2005
Implementation and performance study of a hardware-VIA-based network adapter on Gigabit Ethernet
Fulltext Access 15 Pages 2005
Planar graph routing on geographical clusters
Fulltext Access 15 Pages 2005
Intrusion detection using an ensemble of intelligent paradigms
Fulltext Access 16 Pages 2005
Enabling ubiquitous sensor networking over mobile networks through peer-to-peer overlay networking
Fulltext Access 16 Pages 2005
Internet like control for MPLS based traffic engineering: performance evaluation
Fulltext Access 16 Pages 2005
Optical networks-the electro-optic reality
Fulltext Access 16 Pages 2005
“Pay bursts only once” does not hold for non-FIFO guaranteed rate nodes
Fulltext Access 16 Pages 2005
Path-based next N trace prefetch in trace processors
Fulltext Access 16 Pages 2005
Programming paradigms for reconfigurable computing
Fulltext Access 16 Pages 2005
Priority queueing with finite buffer size and randomized push-out mechanism
Fulltext Access 16 Pages 2005
Stability of size-based scheduling disciplines in resource-sharing networks
Fulltext Access 16 Pages 2005
A simple analytical framework to analyze search strategies in large-scale peer-to-peer networks
Fulltext Access 16 Pages 2005
A dynamic and reliability-driven scheduling algorithm for parallel real-time jobs executing on heterogeneous clusters
Fulltext Access 16 Pages 2005
A wireless extension of Profibus DP based on the Bluetooth radio system
Fulltext Access 16 Pages 2005
Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks
Fulltext Access 16 Pages 2005
A general call admission policy for next generation wireless networks
Fulltext Access 16 Pages 2005
SF-DeviL: an algorithm for energy-efficient Bluetooth scatternet formation and maintenance
Fulltext Access 16 Pages 2005
Weight allocation in distributed admission control for wireless networks
Fulltext Access 16 Pages 2005
SNMP information based routing mechanism for fast handoff in mobile IP
Fulltext Access 16 Pages 2005
Analysis of multiservice cellular networks with asymmetrical traffic and handoff queue
Fulltext Access 16 Pages 2005
A dynamic signaling mechanism based on symbiotic packet processing
Fulltext Access 16 Pages 2005
Distributed block independent set algorithms and parallel multilevel ILU preconditioners
Fulltext Access 16 Pages 2005
Memory-side prefetching for linked data structures for processor-in-memory systems
Fulltext Access 16 Pages 2005
Optimizing ad hoc trade in a commercial barter trade exchange
Fulltext Access 16 Pages 2005
A framework for the design, synthesis and cycle-accurate simulation of multiprocessor networks
Fulltext Access 16 Pages 2005
TYPHOON: mobile distributed hash tables
Fulltext Access 16 Pages 2005
Asserting the utility of CO2P3S using the Cowichan Problem Set
Fulltext Access 16 Pages 2005
Performance of the Java security manager
Fulltext Access 16 Pages 2005
Capital market reaction to defective IT products: The case of computer viruses
Fulltext Access 16 Pages 2005
Defending against spoofed DDoS attacks with path fingerprint
Fulltext Access 16 Pages 2005
A diversity-based method for infrequent purchase decision support in e-commerce
Fulltext Access 16 Pages 2005
A framework for the assessment and analysis of electronic government proposals
Fulltext Access 16 Pages 2005
Combining bundle search with buyer coalition formation in electronic markets: A distributed approach through explicit negotiation
Fulltext Access 16 Pages 2005
<< < 375 376 377 378 379 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities