Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique
Fatemeh. Dehghani, Shahram. Darooei
Comparative Analysis of Classification Algorithms on KDD'99 Data Set
Iknoor Singh Arora, Gurpriya Kaur Bhatia, Amrit Pal Singh
An Improved Kerberos Scheme Based on Dynamic Password
Wen Lei, Hai Cao, Xingjian Liang, Hong Zhang
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
Apurva R. Naik, Lalit B. Damahe
A Hybrid P2P Approach to Service Discovery in the Cloud
Jing Zhou, Nor Aniza Abdullah, Zhongzhi Shi
Mixed QoS Controlled Wireless Streaming Media Transmission Strategy
Fu Xianping, Men Yugang
Discrete Simulation of the Remote Access to the Resources of a Virtual Research Laboratory
Radi Romansky
A New Centrality Measure for Tracking Online Community in Social Network
Sanjiv Sharma, G.N. purohit
Association Rule Hiding by Positions Swapping of Support and Confidence
Padam Gulwani
Hashing Key Based Analysis of Polynomial Encryption Standard
Pic Sonia, Surender Kumar Grewal
Novel Hybrid Model: Integrating Scrum and XP
Zaigham Mushtaq, M. Rizwan Jameel Qureshi
Trends, Issues and Challenges Concerning Spam Mails
Jitendra Nath Shrivastava, Maringanti Hima Bindu
Pre-Processing of University Webserver Log Files for Intrusion Detection
Bukola A. Onyekwelu, B. K. Alese, A. O. Adetunmbi
Named Data Networking: Investigate of New Infrastructure for Future of Internet
Hadis Rezaei, Asad Vakili
Design of an Android Application for Secure Chatting
Ammar H. Ali, Ali M. Sagheer
Smart Agent Learning based Hotel Search System- Android Environment
Wayne Lawrence, Suresh Sankaranarayanan
An Efficient Approach to Genetic Algorithm for Task Scheduling in Cloud Computing Environment
Shaminder Kaur, Amandeep Verma
Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers
G. Ramesh, R. Umarani
E-Commerce Adoption in Saudi Arabia: an Assessment of International, Regional and Domestic Web Presence
Mutlaq B. Alotaibi
Distributed Defense: An Edge over Centralized Defense against DDos Attacks
Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan
Anomaly Detection System in Secure Cloud Computing Environment
Zhengbing Hu, Sergiy Gnatyuk, Oksana Koval, Viktor Gnatyuk, Serhii Bondarovets
Homomorphic Cryptosystem
Alisha Rohilla, Mehak Khurana, Meena Kumari
A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing
Oladeji P. Akomolafe, Matthew O. Abodunrin
Analysis of QoS in Software Defined Wireless Network with Spanning Tree Protocol
Rafid Mustafiz, Abu Sayem Mohammad Delowar Hossain, Nazrul Islam, Mohammad Motiur Rahman
Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology
Ashish Kumar Khare, J. L. Rana, R. C. Jain
K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration
Harjot Kaur, Er. Prince Verma
Handover Comparisons of WiMAX and WiMAX Release 2
Ali Sufyan, Yasir Salam, Sundas Amin
Detecting Pirated Movie’s with Similarity Assessment Based on Earth Mover’s Distance
Srinivas Baggam, K.Venkata Rao, P. Suresh Varma
iText – SMS-based Web Services for Low-end Cell Phones
Juan Li, Justin Anderson, Matti Kariluoma, Kailash Joshi, Prateek Rajan, Pubudu Wijeyaratne
The Web Navigability Structure of E- Banking in India
Arvinder Kaur, Diksha Dani
The Extensive Bit-level Encryption System (EBES)
Satyaki Roy
Study of Parametric Performance Evaluation of Machine Learning and Statistical Classifiers
Yugal kumar, G. Sahoo
An Efficient IBE Scheme using IFP and DDLP
Chandrashekhar Meshram
Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards
Quist-Aphetsi Kester, Koumadi Koudjo M, Nii.Narku Quaynor
Evaluation of the Extended CBD Model: A Case Study using IMS Application
M. Rizwan Jameel Qureshi, Ahmed Barnawi
Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM)
Moses O. Onyesolu, Amara C. Okpala
Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data
Anand Khandare, A. S. Alvi
Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense
Muhammad Aamir, Muhammad Arif
Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets
Chandrashekhar Azad, Vijay Kumar Jha
Mechanism and Algorithm for Indirect Schema Mapping Composition
Bo Wang, Bo Guo