Search

Your search keyword '"COMPUTER network protocols"' showing total 123 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publisher world scientific publishing company Remove constraint Publisher: world scientific publishing company
123 results on '"COMPUTER network protocols"'

Search Results

1. Study and Design of Privacy-Preserving Range Query Protocol in Sensor Networks Based on the Integration Reversal 0-1 Encoding with Bloom Filter.

2. Link Failure Recovery in SDN: High Efficiency, Strong Scalability and Wide Applicability.

3. Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol.

4. Acentric Scheduling Strategy for SLA-Based Multi-Tenant Queries.

5. A Stabilizing Optimal ℓ-Exclusion Algorithm.

6. AFTER: Asynchronous Fault-Tolerant Router Design in Network-on-Chip.

7. Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior.

8. An FPGA Architecture for the Recovery of WPA/WPA2 Keys.

9. EFFICIENT SCHEME FOR CONGESTION CONTROL IN NETWORK-ON-CHIP WITH QoS CONSIDERATION.

10. Network simulation task partition method in heterogeneous computing environment.

11. SOFTWARE ENGINEERING JOB PRODUCTIVITY - A SYSTEMATIC REVIEW.

12. A NEW SCHEDULING PROTOCOL DESIGN BASED ON DEFICIT WEIGHTED ROUND ROBIN FOR QoS SUPPORT IN IP NETWORKS.

13. COOPERATIVE RECONFIGURATION OF USER INTERFACE MODELS FOR LEARNING CRYPTOGRAPHIC PROTOCOLS.

14. A CONTRACT-EXTENDED PUSH-PULL-CLONE MODEL FOR MULTI-SYNCHRONOUS COLLABORATION.

15. RISK ASSESSMENT AND ADAPTIVE GROUP TESTING OF SEMANTIC WEB SERVICES.

16. REPRESENTING 3D FACE FROM POINT CLOUD TO FACE-ALIGNED SPHERICAL DEPTH MAP.

17. PRIVACY-PRESERVING OLAP FOR ACCURATE ANSWER.

18. A SECURE REVERSION PROTOCOL THAT GENERATES PAY-OFFS DOMINATING REWARDS FROM CORRELATED EQUILIBRIUM.

19. CAPTURING INTERFACE PROTOCOLS TO SUPPORT COMPREHENSION AND EVALUATION OF C++ LIBRARIES.

20. AN ACTIVE ACCESS-POINT SELECTION APPROACH FOR DEPENDABLE WIRELESS MESH NETWORKS.

21. MEASURING EFFICIENCY IN OPPORTUNISTIC AD HOC NETWORKS.

22. SPIℂA'S MULTI-PARTY NEGOTIATION PROTOCOL:: IMPLEMENTATION USING YAWL.

23. AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES.

24. A MULTI-AGENT STRATEGY FOR A SIMPLE COOPERATIVE BEHAVIOR.

25. USING SIMPLE DISJOINT DECOMPOSITION TO PERFORM SECURE COMPUTATIONS.

26. MULTICAST CONGESTION CONTROL SRMSH APPROACH USING COMMUNICATING REAL-TIME STATE MACHINES.

27. ONTOLOGY-GUIDED SERVICE-ORIENTED ARCHITECTURE COMPOSITION TO SUPPORT COMPLEX AND TAILORABLE PROCESS DEFINITIONS.

28. COMBINING GENETIC PROGRAMMING AND MODEL-DRIVEN DEVELOPMENT.

29. SYNCHRONIZATION IN RANDOM GEOMETRIC GRAPHS.

30. A PROTOCOL FOR MAKING AN AGREEMENT IN A PEER-TO-PEER (P2P) SOCIETY.

31. AN EFFICIENT NEIGHBOR-AWARE PROTOCOL FOR SNET FORMATION.

32. A NOVEL SPECTRUM OF EPOCH CONVERGENT CONGESTION CONTROL.

33. OPTIMAL INTERCONNECTION OF AD HOC INJECTION NETWORKS.

34. DYNAMIC SERVICE COMPOSITION:: A DISCOVERY-BASED APPROACH.

35. CRÈME:: AN AUTOMATIC INVARIANT PROVER OF BEHAVIORAL SPECIFICATIONS.

36. A QUALITY AND EFFECTIVENESS REVIEW PROTOCOL FOR STRATEGIC ENVIRONMENTAL ASSESSMENT (SEA) IN DEVELOPING COUNTRIES.

37. ON A NEW CLASS OF LOAD BALANCING NETWORK PROTOCOLS.

38. DESIGN AND IMPLEMENTATION OF A P2P COOPERATIVE PROXY CACHE SYSTEM.

39. PARAMETER DECISION FOR ENHANCING PERFORMANCE OF WIRELESS LANs WITH PRIORITIZED MESSAGES.

40. AN APPLICATION OF ESOP EXPRESSIONS TO SECURE COMPUTATIONS.

41. THE RADAR ARCHITECTURE FOR PERSONAL COGNITIVE ASSISTANCE.

42. CLUSTERING PROTOCOL FOR SENSOR NETWORKS.

43. ROLE-BASED SERIALIZABILITY USING ROLE ORDERING SCHEDULERS.

44. LOCAL DETECTION OF SELFISH ROUTING BEHAVIOR IN AD HOC NETWORKS.

45. smartAR:: A PSEUDO- END-TO-END APPROACH FOR IP MICRO-MOBILITY.

46. DELAY-ENERGY AWARE ROUTING PROTOCOL FOR HETEROGENEOUS WIRELESS AD HOC NETWORKS.

47. A NEW APPROACH FOR CENTRALIZED END-SYSTEM MULTICAST PROTOCOL.

48. FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS.

49. ENHANCED NETWORK SIGNALING FOR 10 GIGABIT ETHERNET TO ACHIEVE A LAN-WAN SEAMLESS INTERFACE AND ITS IMPLEMENTATION IN THE PHY-LSI/TRANSCEIVER MODULE.

50. GEOMETRIC BROADCAST PROTOCOL FOR HETEROGENEOUS SENSOR NETWORKS.

Catalog

Books, media, physical & digital resources