Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks
A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks
A Robust Fault Detection Scheme for the Advanced Encryption Standard
Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions
Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP
Mobile Localization Based on Clustering
Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing
Time Window Management for Alert Correlation using Context Information and Classification
Resource Provisioning for Routing with Priorities
Study and Analysis of Text Steganography Tools
An Efficiency and Algorithm Detection for Stenography in Digital Symbols
A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)
Scheduling in Grid Systems using Ant Colony Algorithm
Hybrid Intrusion Detection Using Ensemble of Classification Methods
An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
Energy Scavenging Technology and Components in WSN
Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network
Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets
A Comparative Study of Key Management Protocols for WSN
Visualization of Influencing Nodes in Online Social Networks
A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS
Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System
Scrum and Temporal Distance-Based Global Software Development
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
Feature Selection for Modeling Intrusion Detection
Optimal Route Based Advanced Algorithm using Hot Link Split Multi-Path Routing Algorithm
Integrity Analysis of Multimedia File Transmission between Mobile Phones
Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes
Trust Metric based Soft Security in Mobile Pervasive Environment
A Preliminary Study of Fake Fingerprints
Communication Centrality in Dynamic Networks Using Time-Ordered Weighted Graph
An Architecture for Alert Correlation Inspired By a Comprehensive Model of Human Immune System
An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis
Design of a Web Interface for Fractional Chaotic Systems
Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption
Extending the WSN lifetime by Dividing the Network Area into a Specific Zones
Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length
← Предыдущая
Следующая страница →
1
|
...
|
27
|
28
|
29
|
30
|
31
|
32
|
33
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.