Search

Your search keyword '"COMPUTER network protocols"' showing total 36 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Database Academic Search Index Remove constraint Database: Academic Search Index Publisher ios press Remove constraint Publisher: ios press
36 results on '"COMPUTER network protocols"'

Search Results

1. Traffic and delay aware routing using optimization algorithm for wireless sensor networks.

2. IsaNet: A framework for verifying secure data plane protocols.

3. Design of medical equipment system based on neural network algorithm and network feature.

4. An efficient algorithm to detect DDoS amplification attacks.

5. Congestion control performance investigation of ModQUIC protocol using JioFi network: A case study.

6. Tree-based multicast service provisioning with maximum immunity in cognitive radio networks.

7. Computer network security evaluation simulation model based on neural network.

8. Improved LEACH protocol based on efficient clustering in wireless sensor networks.

9. Secure authentication in the grid: A formal analysis of DNP3 SAv5.

10. Reliable Restricted Process Theory.

11. New Proposals to Improve a MAC Layer Protocol in Wireless Sensor Networks.

12. An energy efficient protocol based on fuzzy logic to extend network lifetime and increase transmission efficiency in wireless sensor networks.

13. FPGA-based research of monitoring MPDCPD-CSMA protocol in cognitive wireless networks.

14. Energy efficient cognitive body area network (CBAN) using lookup table and energy harvesting.

15. Commitment-based Agent Interaction in JaCaMo+.

16. RSP-WRAN: Resource sharing protocol for inter/intra WRAN communications.

17. Proof of Multicopy via Proof of File Position in Cloud.

18. An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking.

19. A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing.

20. Resource sharing strategies: Which sharing to better protect primary shortest paths?

21. A negotiation protocol to improve long distance truck parking.

22. Automatic protocol reverse engineering using grammatical inference.

23. A secret key establishment protocol for wireless networks using noisy channels.

24. An improved hash-based RFID two-way security authentication protocol and application in remote education.

25. An efficient estimation method coping with the capture effect for RFID tags identification and application in remote learning.

26. A reaction-diffusion mechanisms for node scheduling design of wireless sensor networking systems.

27. Automated analysis of security protocols with global state.

28. Stochastic Petri net-based modeling and formal analysis of fault tolerant Contract Net Protocol.

29. VAStream: Virtual adaptive substream partition and scheduling in data-driven P2P live streaming.

30. Secure outsourced garbled circuit evaluation for mobile devices.

31. Real-time agreement and fulfilment of SLAs in Cloud Computing environments.

32. The impact of social cloud reputation and structure on rational computation.

33. A reliable data delivery scheme with delay constraints for wireless sensor networks.

34. A fieldbus applied to sensor-actuator monitoring network.

35. A new dialogue strategy in multi-agent systems.

36. Choreographing agent encounters in the Semantic Web using rules.

Catalog

Books, media, physical & digital resources