Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model
Liying Zhang, Lun Xie, Weize Li, Zhiliang Wang
AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services
Olakanmi O.Oladayo
Enhanced Role Based Access Control Mechanism for Electronic Examination System
Adebukola Onashoga, Adebayo Abayomi-Alli, Timileyin Ogunseye
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review
Sumit Goyal
Classification via Clustering for Anonymization Data
Sridhar Mandapati, Raveendra Babu Bhogapathi, M.V.P.C.Sekhara Rao
Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization
Vikram Jeet Singh, Vikram Kumar, Kishori Lal Bansal
BDCC: Backpressure routing and dynamic prioritization for congestion control in WMSNs
Akbar MAJIDI, Hamid MIRVAZIRI
A Comparative Survey on Optical Burst Switched Network Simulators
Terrance Frederick Fernandez, T. Megala, N.Sreenath
RSUs Deployment Using Parallel Scheduling
Ramneek kaur
Energy Conservation for Ad Hoc On-Demand Distance Vector Multipath Routing Protocol
Omar Smail, Zoulikha Mekkakia, Belhadri Messabih, Rachida Mekki, Bernard Cousin
Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System
Geetha Mary A, D.P. Acharjya, N. Ch. S. N. Iyengar
A Detailed Analysis of Grain family of Stream Ciphers
Mohammad Ubaidullah Bokhar, Shadab Alam, Syed Hamid Hasan
The Rating Mechanism for the Trusted Relationship Establishment for the Security of the Distributed Computer Systems
Vadym Mukhin
Scrum and Temporal Distance-Based Global Software Development
Asmaa Fowzi Alotaibi, M. Rizwan Jameel Qureshi
Comparative Performance Analysis of AODV and AODV-MIMC Routing Protocols for Mobile Ad hoc Networks
P.Periyasamy, E.Karthikeyan
Router-based Content-aware Data Redirection for Future CDN Systems
Janaka L. Wijekoon, Erwin H. Harahap, Shinichi Ishida, Rajitha L. Tennekoon, Hiroaki Nishi
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Saman Gerami Moghaddam, Amin Nasiri, Mohsen Sharifi
Performance Comparison of Single and Multiple Watermarking Techniques
Mohananthini Natarajan, Yamuna Govindarajan
Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
Soumyabrata Talapatra, Alak Roy
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
R.Mohan, N.P.Gopalan
Feature Selection for Modeling Intrusion Detection
Virendra Barot, Sameer Singh Chauhan, Bhavesh Patel
Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks
Abdoulaye Diop, Yue Qi, Qin Wang
Accelerating the Response of Query in Semantic Web
Nooshin Azimi, Shahla Kiani
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
Analysis of Host-Based and Network-Based Intrusion Detection System
Amrit Pal Singh, Manik Deep Singh
Optimal Route Based Advanced Algorithm using Hot Link Split Multi-Path Routing Algorithm
Akhilesh A. Waoo, Sanjay Sharma, Manjhari Jain
A New Classification Scheme for Intrusion Detection Systems
Bilal Maqbool Beigh
SysProp: A Web-based Data Backup, Synchronization and System Administration
Salekul Islam, Mohammad Amanul Islam
Effect of Maintenance on Computer Network Reliability
Rima Oudjedi Damerdji, Myriam Noureddine
Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority
Akbar Majidi, Hamid Mirvaziri
C2DF: High Rate DDOS filtering method in Cloud Computing
Pourya Shamsolmoali, M.Afshar Alam, Ranjit Biswas
Artificial Intrusion Detection Techniques: A Survey
Ashutosh Gupta, Bhoopesh Singh Bhati, Vishal Jain
SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks
Khaled Zeraoulia, Nadjib Badache
A Smart and Generic Secured Storage Model for Web based Systems
P.Iyappan, V.PrasannaVenkatesan
Trust Metric based Soft Security in Mobile Pervasive Environment
Madhu Sharma Gaur, Bhaskar Pant
Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System
Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey
An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks
P. Raghu Vamsi, Krishna Kant
Implementation of Risk Management with SCRUM to Achieve CMMI Requirements
Eman Talal Alharbi, M. Rizwan Jameel Qureshi
OpenFlow Technology: A Journey of Simulation Tools
Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi, Anuradha, Shashi Kumari
Detection Block Model for SQL Injection Attacks
Diksha G. Kumar, Madhumita Chatterjee