Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Dynamical Frequency Assignment of WSN Based on Cloud Computing Technology
JING Jun-li,
YANG Jie
New Downlink Scheduling Framework for Hybrid Unicast and Multicast Traffic in WiMAX Networks
Rashid Karimi,
Saleh Yousefi,
Ali Azarpeyvand,
Vahid.K.Alilou
Design and Simulation Implementation of an Improved PPM Approach
Guo Fan,
Feng Bo,
Yu Min
Software Defect Detection-oriented Static Analysis Techniques
Hua ZHANG
TCP/IP Jumbo Frames Network Performance Evaluation on A Test-bed Infrastructure
Shaneel Narayan,
Paula Raymond Lutui
Evaluation of Performance for Wireless Sensor Networks Based on Gray Theory
JING Jun li,
YANG Jie
Intelligent and Distributed Localization of Nodes in Wireless Sensor Networks
Ibrahim S. I. Abuhaiba,
Amina Y. Al-Salluta
Dynamic Request Set based Mutual Exclusion Algorithm in MANETs
Ashish Khanna,
Awadhesh Kumar Singh,
Abhishek Swaroop
Enhanced Techniques for Filtering of Wall Messages over Online Social Networks (OSN) User Profiles
Nikhil Sanyog Choudhary,
Himanshu Yadav,
Anurag Jain
Performance Evaluation of QoS Parameters for Varied Network Overheads for Convergecast Routing in WSN
Lovepreet kaur,
Jyoteesh Malhotra
CoAP Protocol for Constrained Networks
Manveer Joshi,
Bikram Pal Kaur
Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE
T. Kavitha,
B. Narendra,
K.Thejaswi,
P. Nageswara Rao
A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining
Roop Kamal Kaur,
Kamaljit Kaur
A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing
Tania Gaur,
Divya sharma
Managing Big Data: A Step towards Huge Data Security
PankajDeep Kaur,
Awal Adesh Monga
Research on Wireless Network Security Awareness of Average Users
Paschal A. Ochang,
Philip J. Irving,
Paulinus O. Ofem
Big Data Compression in Mobile and Pervasive Computing
PankajDeep Kaur,
Sandeep Kaur,
Amneet Kaur
A Survey on Secure Routing Protocols in Wireless Sensor Networks
Yasir Arfat,
Riaz Ahmed Shaikh
Critical Analysis of Distributed Localization Algorithms for Wireless Sensor Networks
Santar Pal Singh,
S. C. Sharma
Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm
Pooja Kundu,
Neeti Kashyap
Efficient Techniques to Reduce Effects of Topology Mismatch and Heterogeneity in Unstructured P2P Networks
B Lalitha
Analysis of AODV Protocol against Pause Time Using NS2.34
Samiksha Nikam,
B.T. Jadhav
A Survey on Detection and Prevention Techniques for SQL Injection Attacks
Harish Dehariya,
Piyush Kumar Shukla,
Manish Ahirwar
Lecture Time Table Reminder System on Android Platform (Case Study: Final Year Students, Computer Science Department)
Ayeni Olaniyi Abiodun,
Dada Olabisi,
Talabi Olanrewaju
IP Packet Filtering using Hash Table for Dedicated Real Time IP Filter
Rohit G Bal
Providing Useful Data Reliably to Mobile Cloud Users from Random Wireless Sensor Network
Shanthosh Palani
Impact of Mobility on MANETs Routing Protocols Using Group Mobility Model
Subodh Kumar,
G.S. Agrawal,
Sudhir Kumar Sharma
Software Defined Network: The Next Generation Internet Technology
Kshira Sagar Sahoo,
Sambit Kumar Mishra,
Sampa Sahoo,
Bibhudatta Sahoo
Efficient Adaptive Path Load Balanced Gateway Management Strategies for Integrating MANET and the Internet
Rafi U Zaman,
S. Shehnaz Begum,
Khaleel Ur Rahman Khan,
A. Venugopal Reddy
Trust Models in Cloud Computing: A Review
Ritu,
Sukhchandan Randhawa,
Sushma Jain
An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET
Mohammed Azza,
Sofiane Boukli Hacene
PRDSA: Effective Parallel Digital Signature Algorithm for GPUs
Sapna Saxena,
Neha Kishore
Selecting the COTS Components Using Ad-hoc Approach
Somya Goyal,
Anubha Parashar
MVGDRA: Modified Virtual Grid based Dynamic Routes Adjustment Scheme for Mobile Sink-based Wireless Sensors Networks
Navpreet Kaur,
Ashwani Kumar Narula
The Impact of Sensor Area on Worm Propagation Using SEIR and SEIR-V Models: A Preliminary Investigation
ChukwuNonso H. Nwokoye,
Njideka N. Mbeledogu,
Ihekeremma A. Ejimofor
A Trust-based Security Approach in Hierarchical Wireless Sensor Networks
Mohsen Salehi,
Jamal Karimian
Design and Development of PC Based Data Acquisition System for Radiation Measurement
M. A. A. Mashud,
Md. Shamim Hossain,
M. Nurul Islam,
Md. Serajul Islam
Novel High Quality Data Hiding System
Fahd Alharbi
A Hybrid Restoration Approach of Defocused Image Using MGAM and Inverse Filtering
Fenglan Li,
Liyun Su,
Yun Jiang,
Min Sun
Aerial Video Processing for Land Use and Land Cover Mapping
Ashoka Vanjare,
S.N. Omkar,
Akhilesh Koul,
Devesh
← Предыдущая
Следующая страница →
1
|
...
|
39
|
40
|
41
|
42
|
43
|
44
|
45
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.