Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Stochastic RA-Network for the Nodes Functioning Analysis in the Distributed Computer Systems
Zhengbing Hu,
Vadym Mukhin,
Heorhii Loutskii,
Yaroslav Kornaga
Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks
Goudru N.G,
Vijaya Kumar B.P
An Improved Energy Aware Distributed Clustering Protocol for Wireless Sensor Networks
Vrinda Gupta,
Rajoo Pandey
Clustering in Wireless Sensor Networks- A Survey
Sukhkirandeep Kaur,
Roohie Naaz Mir
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
Padma Lochan Pradhan
Verifier-based Password Authenticated 3P-EKE Protocol using PCLA keys
Archana Raghuvamshi,
Premchand Parvataneni
Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings
Jianhua Zhu,
Guohua Cui,
Shiyang Zhou
An Improved Hybrid Mechanism for Secure Data Communication
Sangeeta Dhall,
Bharat Bhushan,
Shailender Gupta
Improving the Performance of Routing Protocol using Genetic Algorithm
Meenakshi Moza,
Suresh Kumar
Spam Reduction by using E-mail History and Authentication (SREHA)
Adwan F. Yasin
Password Security: An Analysis of Password Strengths and Vulnerabilities
Katha Chanda
Vertical Handoff Decision Algorithm Based on PRSS and Dwell Time
Jyoti Madaan,
Indu Kashyap
An Efficient Position based Power Aware Routing Algorithm in Mobile Ad-hoc Networks
Md. Mahbubur Rahman,
Md. Akhtaruzzaman
Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
Yasmine Medjadba,
Somia Sahraoui
Multiresolution Fuzzy C-Means Clustering Using Markov Random Field for Image Segmentation
Xuchao Li,
Suxuan Bian
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
Liyaqat Nazir,
Roohie Naaz Mir
An Improved Active Shape Model Application onFacial Feature Localization
Min.Wang,
Yi ling.Wen,
Li.Fang,
Wei ping.Sun
A Specialized Lightweight Metamorphic Function for KASUMI Metamorphic Cipher and Its FPGA Implementation
Rabie A. Mahmoud,
A. Baith Mohamed
Vertical Handoff with Predictive Received Signal Strength in Next Generation Wireless Network
Jyoti Madaan,
Indu Kashyap
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique
Abhishek Bansal,
Sunil K. Muttoo,
Vinay Kumar
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
E.Suresh Babu,
C. Nagaraju,
MHM Krishna Prasad
Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing
Rachhpal Singh
A SCPS-NP Routing Algorithm Based on Mobile IP Routing
Kai Hu,
He Yang,
Hong Jiang,
Shu Jiang,
Lujia Chen
A Novel Scheme for Image Authentication and Secret Data Sharing
Auqib Hamid Lone,
Ab Waheed Lone,
Moin Uddin
Honeypot System for Attacks on SSH Protocol
Solomon Z. Melese,
P.S. Avadhani
Alternative Equations for Guillou-Quisquater Signature Scheme
J. Ettanfouhi,
O. Khadir
Low-power Wireless Pressure Transmitter and Net of Oil-well Based on Zigbee
Xiwei Yang,
Changyun Li
Interaction of High Speed TCPs with Recent AQMs through Experimental Evaluation
VandanaKushwaha,
Ratneshwer
Detection and Mitigation of Sybil Attack in Peer-to-peer Network
Arpita M. Bhise,
Shailesh D. Kamble
A Proxy based Framework for Efficient Range Query Processing in a Cellular Network
Muhamed Ilyas,
Vijayakumar
A Clientless Endpoint Authentication SchemeBased on TNC
Kun Wu,
Zhongying Bai
An Improved Wavelet Filtering Algorithm and Its FPGA Implementation
Lan Yang,
Xiang-mo Zhao,
Fei Hui,
Xin Shi
32Still Image Compression Algorithm Based on Directional Filter Banks
Chunling Yang,
Duanwu Cao,
Li Ma
Computational Independence in the Design of Cryptographic Protocols
István Vajda
Using String Kernel for Document Clustering
Qingwei Shi,
Xiaodong Qiao,
Guangquan Xu
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Prabhjot Singh Chahal,
Surinder Singh Khurana
A New Approach for Remote User Authentication in a Multi - Server Environment Based on DYNAMIC-ID using SMART-CARD
Shanu Gaharana,
Darpan Anand
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
Apurva R. Naik,
Lalit B. Damahe
Reliable and Power Efficient Routing Protocol for MANETs
V.Sowmya Devi,
Nagaratna P Hegde
A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-oriented Data Centers
Wei Liu,
Feiyan Shi,
Wei Du,
Hongfeng Li
← Предыдущая
Следующая страница →
1
|
...
|
60
|
61
|
62
|
63
|
64
|
65
|
66
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.