Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
Yasmine Medjadba, Somia Sahraoui
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
Liyaqat Nazir, Roohie Naaz Mir
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique
Fatemeh. Dehghani, Shahram. Darooei
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
E.Suresh Babu, C. Nagaraju, MHM Krishna Prasad
A SCPS-NP Routing Algorithm Based on Mobile IP Routing
Kai Hu, He Yang, Hong Jiang, Shu Jiang, Lujia Chen
A Novel Scheme for Image Authentication and Secret Data Sharing
Auqib Hamid Lone, Ab Waheed Lone, Moin Uddin
Honeypot System for Attacks on SSH Protocol
Solomon Z. Melese, P.S. Avadhani
Comparative Analysis of Classification Algorithms on KDD'99 Data Set
Iknoor Singh Arora, Gurpriya Kaur Bhatia, Amrit Pal Singh
A Wireless Video Transmission Scheme Based on MAC-independent Opportunistic Routing &Encoding Protocol
Yong Liu, Li Chen, Lifeng Sun, Shiqiang Yang
Efficient Resource Management for Multicast Ad Hoc Networks: Survey
Amit Chopra, Rajneesh Kumar
Detection and Mitigation of Sybil Attack in Peer-to-peer Network
Arpita M. Bhise, Shailesh D. Kamble
A Clientless Endpoint Authentication SchemeBased on TNC
Kun Wu, Zhongying Bai
Computational Independence in the Design of Cryptographic Protocols
István Vajda
An Improved Kerberos Scheme Based on Dynamic Password
Wen Lei, Hai Cao, Xingjian Liang, Hong Zhang
Low Level Performance Evaluation of InfiniBand with Benchmarking Tools
Eric Gamess, Humberto Ortiz-Zuazaga
Using String Kernel for Document Clustering
Qingwei Shi, Xiaodong Qiao, Guangquan Xu
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Prabhjot Singh Chahal, Surinder Singh Khurana
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture
Ming Wan, Ying Liu, Hongke Zhang
A New Approach for Remote User Authentication in a Multi - Server Environment Based on DYNAMIC-ID using SMART-CARD
Shanu Gaharana, Darpan Anand
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
Apurva R. Naik, Lalit B. Damahe
A Hybrid P2P Approach to Service Discovery in the Cloud
Jing Zhou, Nor Aniza Abdullah, Zhongzhi Shi
A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-oriented Data Centers
Wei Liu, Feiyan Shi, Wei Du, Hongfeng Li
Mixed QoS Controlled Wireless Streaming Media Transmission Strategy
Fu Xianping, Men Yugang
Trusted Mobile Client for Document Security in Mobile Office Automation
Xiaojun Yu, Qiaoyan Wen
Kernel Techniques in Support Vector Machines for Classification of Biological Data
Hao Jiang, Wai-Ki Ching, Zeyu Zheng
On Construction of Gene-PDB Structure Mapping with Applications in Functional Annotation of Human Genes
Xi Chen, Hao Jiang, Wai-Ki Ching, Limin Li
NoC Research and Practice: Design and Implementation of 2×4 2D-Torus Topology
Xingang Ju, Liang Yang
A Semantic Approach to the Notion of Representation and Its Application to Information Systems
Lin Liu, Junkang Feng
An Optimization Model and DPSO-EDA for Document Summarization
Rasim M. Alguliev, Ramiz M. Aliguliyev, Chingiz A. Mehdiyev
Architecture for Accessing Heterogeneous Databases
Mohd Kamir Yusof, Ahmad Faisal Amri Abidin, Mohd Nordin Abdul Rahman
Algorithmic Aspects for Total Connected Dominating Sets in Mobile Ad Hoc Wireless Networks
C.D.Guruprakash, B.P.Mallikarjunaswamy
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design
M. Rizwan Jameel Qureshi, Mahaboob Sharief Shaik, Nayyar Iqbal
Implementing SEReleC with EGG
Vishwas J Raval, Padam Kumar
Classification of Electroencephalographic Changes in Meditation and Rest: using Correlation Dimension and Wavelet Coefficients
Atefeh Goshvarpour, Ateke Goshvarpour
Star Coloring Problem: The DNA Solution
G. Sethuraman, Kavitha Joseph
Association Rule Hiding by Positions Swapping of Support and Confidence
Padam Gulwani
Web Refinding Support System Based on Process Recollective Activity
Masashi Toda
Solving Web-based Applications Architectural Problems in the Cloud: The Way Forward
Philip Achimugu, Oluwatolani Oluwagbemi, Ishaya Gambo
A Study and Critical Survey on Service Reusability Metrics
T. Karthikeyan, J. Geetha
Intelligent Reduction in Signaling Load of Location Management in Mobile Data Networks
Kashif Munir, Ehtesham Zahoor, Waseem Shahzad, Syed Junaid Hussain