Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7
Научные статьи
В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Mixed QoS Controlled Wireless Streaming Media Transmission Strategy
Discrete Simulation of the Remote Access to the Resources of a Virtual Research Laboratory
A New Centrality Measure for Tracking Online Community in Social Network
Association Rule Hiding by Positions Swapping of Support and Confidence
Hashing Key Based Analysis of Polynomial Encryption Standard
Novel Hybrid Model: Integrating Scrum and XP
Trends, Issues and Challenges Concerning Spam Mails
Pre-Processing of University Webserver Log Files for Intrusion Detection
Named Data Networking: Investigate of New Infrastructure for Future of Internet
Design of an Android Application for Secure Chatting
Smart Agent Learning based Hotel Search System- Android Environment
An Efficient Approach to Genetic Algorithm for Task Scheduling in Cloud Computing Environment
Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers
E-Commerce Adoption in Saudi Arabia: an Assessment of International, Regional and Domestic Web Presence
Distributed Defense: An Edge over Centralized Defense against DDos Attacks
Anomaly Detection System in Secure Cloud Computing Environment
Homomorphic Cryptosystem
A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing
Analysis of QoS in Software Defined Wireless Network with Spanning Tree Protocol
Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology
K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration
Handover Comparisons of WiMAX and WiMAX Release 2
Detecting Pirated Movie’s with Similarity Assessment Based on Earth Mover’s Distance
iText – SMS-based Web Services for Low-end Cell Phones
The Web Navigability Structure of E- Banking in India
The Extensive Bit-level Encryption System (EBES)
Study of Parametric Performance Evaluation of Machine Learning and Statistical Classifiers
An Efficient IBE Scheme using IFP and DDLP
Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards
Evaluation of the Extended CBD Model: A Case Study using IMS Application
Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM)
Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data
Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense
Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets
Mechanism and Algorithm for Indirect Schema Mapping Composition
A Proposal of Case Based Reasoning System for the Appropriate Selection of Components Using CBD
An Improvement over AODV Routing Protocol by Limiting Visited Hop Count
Ontology Based Information Retrieval in Semantic Web: A Survey
Web Crawler Based on Mobile Agent and Java Aglets
Secluding Efficient Geographic Multicast Protocol against Multicast Attacks
← Предыдущая
Следующая страница →
1
|
...
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.