Search

Your search keyword '"COMPUTER network protocols"' showing total 193 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Database Academic Search Index Remove constraint Database: Academic Search Index Publisher ios press Remove constraint Publisher: ios press
193 results on '"COMPUTER network protocols"'

Search Results

1. Traffic and delay aware routing using optimization algorithm for wireless sensor networks.

2. IsaNet: A framework for verifying secure data plane protocols.

3. Design of medical equipment system based on neural network algorithm and network feature.

4. An efficient algorithm to detect DDoS amplification attacks.

5. Congestion control performance investigation of ModQUIC protocol using JioFi network: A case study.

6. Tree-based multicast service provisioning with maximum immunity in cognitive radio networks.

7. Computer network security evaluation simulation model based on neural network.

8. Improved LEACH protocol based on efficient clustering in wireless sensor networks.

9. Secure authentication in the grid: A formal analysis of DNP3 SAv5.

10. Reliable Restricted Process Theory.

11. New Proposals to Improve a MAC Layer Protocol in Wireless Sensor Networks.

12. An energy efficient protocol based on fuzzy logic to extend network lifetime and increase transmission efficiency in wireless sensor networks.

13. FPGA-based research of monitoring MPDCPD-CSMA protocol in cognitive wireless networks.

14. Energy efficient cognitive body area network (CBAN) using lookup table and energy harvesting.

15. Commitment-based Agent Interaction in JaCaMo+.

16. RSP-WRAN: Resource sharing protocol for inter/intra WRAN communications.

17. Proof of Multicopy via Proof of File Position in Cloud.

18. A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing.

19. An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking.

20. Resource sharing strategies: Which sharing to better protect primary shortest paths?

21. A negotiation protocol to improve long distance truck parking.

22. Automatic protocol reverse engineering using grammatical inference.

23. A secret key establishment protocol for wireless networks using noisy channels.

24. An efficient estimation method coping with the capture effect for RFID tags identification and application in remote learning.

25. An improved hash-based RFID two-way security authentication protocol and application in remote education.

26. A reaction-diffusion mechanisms for node scheduling design of wireless sensor networking systems.

27. Automated analysis of security protocols with global state.

28. Stochastic Petri net-based modeling and formal analysis of fault tolerant Contract Net Protocol.

29. VAStream: Virtual adaptive substream partition and scheduling in data-driven P2P live streaming.

30. Secure outsourced garbled circuit evaluation for mobile devices.

31. Real-time agreement and fulfilment of SLAs in Cloud Computing environments.

32. The impact of social cloud reputation and structure on rational computation.

33. A reliable data delivery scheme with delay constraints for wireless sensor networks.

34. A fieldbus applied to sensor-actuator monitoring network.

35. A new dialogue strategy in multi-agent systems.

36. Choreographing agent encounters in the Semantic Web using rules.

37. StatVerif: Verification of stateful processes.

38. Design of a secure communication and handoff protocol for VANETs.

39. An efficient and dependable protocol for critical MANETs.

40. On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.

41. Establishing and preserving protocol security goals.

42. Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.

43. Research topics on web intelligence and communities.

44. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

45. A directional MAC for switchable directional antennas to enhance throughput in crowded infrastructure wireless networks.

46. Route optimization in mobile IPv6 NEMO.

47. Defining Multi-Party Compromises using Unfoldings of Workflow Nets.

48. Tutorial on application-oriented evaluation of recommendation systems.

49. Investigation of TCP and UDP multiple-flow traffic in wireless mobile ad-hoc networks.

50. On Flooding in the Presence of Random Faults.

Catalog

Books, media, physical & digital resources