Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
A SCPS-NP Routing Algorithm Based on Mobile IP Routing
A Novel Scheme for Image Authentication and Secret Data Sharing
Honeypot System for Attacks on SSH Protocol
Comparative Analysis of Classification Algorithms on KDD'99 Data Set
A Wireless Video Transmission Scheme Based on MAC-independent Opportunistic Routing &Encoding Protocol
Efficient Resource Management for Multicast Ad Hoc Networks: Survey
Detection and Mitigation of Sybil Attack in Peer-to-peer Network
A Clientless Endpoint Authentication SchemeBased on TNC
Computational Independence in the Design of Cryptographic Protocols
An Improved Kerberos Scheme Based on Dynamic Password
Low Level Performance Evaluation of InfiniBand with Benchmarking Tools
Using String Kernel for Document Clustering
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture
A New Approach for Remote User Authentication in a Multi - Server Environment Based on DYNAMIC-ID using SMART-CARD
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
A Hybrid P2P Approach to Service Discovery in the Cloud
A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-oriented Data Centers
Mixed QoS Controlled Wireless Streaming Media Transmission Strategy
Trusted Mobile Client for Document Security in Mobile Office Automation
Kernel Techniques in Support Vector Machines for Classification of Biological Data
On Construction of Gene-PDB Structure Mapping with Applications in Functional Annotation of Human Genes
NoC Research and Practice: Design and Implementation of 2×4 2D-Torus Topology
A Semantic Approach to the Notion of Representation and Its Application to Information Systems
An Optimization Model and DPSO-EDA for Document Summarization
Architecture for Accessing Heterogeneous Databases
Algorithmic Aspects for Total Connected Dominating Sets in Mobile Ad Hoc Wireless Networks
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design
Implementing SEReleC with EGG
Classification of Electroencephalographic Changes in Meditation and Rest: using Correlation Dimension and Wavelet Coefficients
Star Coloring Problem: The DNA Solution
Association Rule Hiding by Positions Swapping of Support and Confidence
Web Refinding Support System Based on Process Recollective Activity
Solving Web-based Applications Architectural Problems in the Cloud: The Way Forward
A Study and Critical Survey on Service Reusability Metrics
Intelligent Reduction in Signaling Load of Location Management in Mobile Data Networks
FileSyncer: Design, Implementation, and Performance Evaluation
Hashing Key Based Analysis of Polynomial Encryption Standard
Novel Hybrid Model: Integrating Scrum and XP
← Предыдущая
Следующая страница →
1
|
...
|
28
|
29
|
30
|
31
|
32
|
33
|
34
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.