Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Zaki A. Khan,
Jamshed Siddiqui,
Abdus Samad
Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length
Dhriti Sundar Maity,
Subhrananda Goswami
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
Md. Ibrahim Abdullah,
Mohammad Muntasir Rahman,
Mukul Chandra Roy
Object Authentication Using RFID Technology: A Multi-tag Approach
Subhasish Dhal,
Indranil Sen Gupta
Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations
Farrukh Nadeem
Fast and Efficient Design of a PCA-Based Hash Function
Alaa Eddine Belfedhal,
Kamel Mohamed Faraoun
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks
Mekkaoui Kheireddine,
Rahmoun Abdellatif,
Gianluigi Ferrari
QoS Comparison of MANET Routing Protocols
Tarunpreet Bhatia,
A.K. Verma
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
Chockalingam Karuppanchetty,
William Edmonds,
Sun-il Kim,
Nnamdi Nwanze
A Mathematical Model on Selfishness and Malicious Behavior in Trust based Cooperative Wireless Networks
Kaushik Haldar,
Nitesh Narayan,
Bimal K. Mishra
Can universally composable cryptographic protocols be practical?
István Vajda
CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU
Jyotsna Sharma,
Maninder Singh
A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia
Yudi Prayudi,
Ahmad Ashari,
Tri K Priyambodo
Data Traffic Modeling During Global Cyberattacks
Volodymyr Mosorov,
Andrzej Kosowski,
Roman Kolodiy,
Zenoviy Kharkhalis
An Innovative Approach for Video Steganography
Koumal Kaushik,
Suman
Extended K-Anonymity Model for Privacy Preserving on Micro Data
Masoud Rahimi,
Mehdi Bateni,
Hosein Mohammadinejad
Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System
Rajendra Gupta,
Piyush Kumar Shukla
Real-Time Encryption/Decryption of Audio Signal
M.I.Khalil
Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles
Needhi Lathar,
Shashi Bhushan,
Manish Mahajan
Multicast Due Date Round-Robin Scheduling Algorithm for Input-Queued Switches
Navaz K,
Kannan Balasubramanian
Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Sedrati Maamar,
Benyahia Abderezzak
Optimized Communication of Group Mobility in WPAN
Suman Lata,
Naveen Goel
An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network
Indrani Das,
D.K. Lobiyal,
C.P.Katti
Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs
Ankit D. Patel,
Rutvij H. Jhaveri
A System Call Randomization Based Method for Countering Code-Injection Attacks
Zhaohui Liang,
Bin Liang,
Lupin Li
Stochastic RA-Network for the Nodes Functioning Analysis in the Distributed Computer Systems
Zhengbing Hu,
Vadym Mukhin,
Heorhii Loutskii,
Yaroslav Kornaga
An Improved Hybrid Mechanism for Secure Data Communication
Sangeeta Dhall,
Bharat Bhushan,
Shailender Gupta
DNA-Genetic Encryption Technique
Hamdy M. Mousa
Improving the Performance of Routing Protocol using Genetic Algorithm
Meenakshi Moza,
Suresh Kumar
An Efficient Position based Power Aware Routing Algorithm in Mobile Ad-hoc Networks
Md. Mahbubur Rahman,
Md. Akhtaruzzaman
An Improved Active Shape Model Application onFacial Feature Localization
Min.Wang,
Yi ling.Wen,
Li.Fang,
Wei ping.Sun
Modelling and Implementation of Network Coding for Video
Can Eyupoglu,
Ugur Yesilyurt
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique
Fatemeh. Dehghani,
Shahram. Darooei
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique
Abhishek Bansal,
Sunil K. Muttoo,
Vinay Kumar
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
E.Suresh Babu,
C. Nagaraju,
MHM Krishna Prasad
Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing
Rachhpal Singh
Contextual Risk-based Decision Modeling for Vehicular Networks
Vijey Thayananthan,
Riaz Ahmed Shaikh
A Genetic Programming Framework for Topic Discovery from Online Digital Library
Yinxing Li,
Ning Li
Efficient Resource Management for Multicast Ad Hoc Networks: Survey
Amit Chopra,
Rajneesh Kumar
Detection and Mitigation of Sybil Attack in Peer-to-peer Network
Arpita M. Bhise,
Shailesh D. Kamble
← Предыдущая
Следующая страница →
1
|
...
|
28
|
29
|
30
|
31
|
32
|
33
|
34
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.