iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Protocol
جزئیات خدمات ترجمه در ترجمه تخصصی
node
routing
routing
routing
nodes
routing
routing
routing
PART 2
Journal of Computer Science 10 (1): 85-90, 2014
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Data Link Management: SDLC and HDLC 211
Data Link Management: SDLC and HDLC 211
Protocol Management in
Protocol Management in
Protocol Management in
As we will see, both interior and exterior routing protocols achieve routing
Seema Mehla et. al. / (IJCSE) International Journal on Computer Science and Engineering
communicatii
Computer Network Security Protocols
A WSN is a highly dynamic network because nodes die
Full circle for Web services transactions?
Full circle for Web services transactions?
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Software Based Radio This chapter offers an introduction to software
2011 First International Conference on Informatics and Computational Intelligence 2011 First International Conference on Informatics and Computational Intelligence
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012
the process of continuous development for educators and other education
provides both data and control channels and handles up to
Introduction Through a series of legislative acts in the late
Journal of Network and Computer Applications 38 (2014) 185–201
W. Guo, W. Zhang / Journal of Network and Computer Applications 38 (2014) 185–201 187
Florida Department of Education Professional Development System Evaluation Protocol Protocol
Florida Department of Education Professional Development System Evaluation Protocol Protocol
Florida Department of Education Professional Development System Evaluation Protocol Protocol
Egyptian Informatics Journal (2013) 14, 109–115
Vehicular Communications 1 (2014) 33–52
a single program can retrieve information stored in millions of
OpenAIR@RGU
OpenAIR@RGU
3 Software video coding and analysis In the context of
3 Software video coding and analysis In the context of
Expert Systems with Applications 41 (2014) 7789–7796
Available online at www.sciencedirect.com
Before looking at these options and how you can configure
COMCOM 5017 No. of Pages 13, Model 5G
DistributedComputingBuildingBlocksforRationalAgents
تئوری محدودیت ها (TOC)
Computer Networks 73 (2014) 185–194
J. Shanghai Jiaotong Univ. (Sci.), 2014, 19(4): 466-475
Available online at www.sciencedirect.com
Basic Network Concepts This chapter covers the fundamental networking concepts
Basic Network Concepts This chapter covers the fundamental networking concepts
An Adaptive Cross-Layer Multichannel QoS-MAC
Computer Communications 35 (2012) 188–195
2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference
Determining Sex and Screening for the Adventitious Presence of Transgenic
G Model
Information Sciences 265 (2014) 23–35
Review for the Ph.D. Thesis of Salvatore
WANG LAYOUT 8/22/05 11:16 AM Page 57
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
we let each node gather location information and find routing
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
Vehicular Communications 1 (2014) 33–52
Vehicular Communications 1 (2014) 33–52
2011 First International Conference on Informatics and Computational Intelligence 2011 First International Conference on Informatics and Computational Intelligence
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
The Communications Assistance for Law Enforcement Act applies in the
2013 UKSim 15th International Conference on Computer Modelling and Simulation
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 3, THIRD QUARTER 2014 1433
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 3, THIRD QUARTER 2014 1433
A Survey on MAC Protocols for Underwater Wireless Sensor Networks
A Survey on MAC Protocols for Underwater Wireless Sensor Networks
A group of wireless mobile hosts making a temporary network
security and privacy protection is an important issue that needs
we propose a novel approach to secure ownership transfer in
based on the hardness of the Learning Parity with Noise
Int. J. Electron. Commun. (AEÜ) 69 (2015) 432–441
we propose a novel approach to secure ownership transfer in
Advanced Secure Routing in Ad hoc mobile
Secure RFID Authentication Protocol with Key
390 IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,VOL.8,NO.2,FEBRUARY2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Arbutus: Network-Layer Load Balancing for
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 359
Optimization of Clustering in SPIN-C
Error Control and Flow Control TCP uses port numbers to
TRAFFIC BASED ADAPTIVE INTELLIGENT HYBRID MAC
Performance Evaluation of Routing Protocols for
TCP/IP Tutorial and
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
This regular paper was presented as part of the main
This regular paper was presented as part of the main
This regular paper was presented as part of the main
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
UNIVERSITY OF CALIFORNIA
each decryption server distributes shares of its secret key to
ComputerStandards&Interfaces36(2014)480–488
International Journal of Computer Applications (0975 – 8887)
ScienceDirect
ScienceDirect
Journal of Network and Computer Applications 35 (2012) 763–769
Communications and Network, 2010, 2, 104-112
Communications and Network, 2010, 2, 104-112
The Bandwidth Adjustment in the Last Round (BA-LR) for WiMAX Network
Journal of Network and Computer Applications 37 (2014) 62–75
Research Article
Hoseini-Hesam07
Hoseini-Hesam-San07
Formal Modelling and Validation of a Novel
Unidirectional Link Counter - A Routing Protocol
Journal of Network and Computer Applications 57 (2015) 85–101
Wireless Pers Commun (2015) 84:2035–2053
Data Link Layer Security Protocols in Wireless
Security Analysis of Reliable Transport Layer Protocols for
TM
Data Link Layer Security Protocols in Wireless
Security Analysis of Reliable Transport Layer Protocols for
2. Wireless sensor network applications in smart grid
Privacy in Browser-Based Attribute Exchange
Privacy in Browser-Based Attribute Exchange
Privacy in Browser-Based Attribute Exchange
ARTICLE IN PRESS
Privacy in Browser-Based Attribute Exchange
IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL.13,NO.8,AUGUST 2014 4283
G Model
Privacy in Browser-Based Attribute Exchange
47213-1
47213-2
Privacy-Mode Switching: Toward Flexible Privacy
Prohibiting Collective Expulsion of Aliens at the European Court of Hum... https://www.asil.org/print/4013
Computer Networks 52 (2008) 2292–2330
پروتکل مسیریابی در شبکه مش
IET Wireless Sensor Systems
2011 International Conference on Intelligence Science and Information Engineering
Journal of Network and Computer Applications 37 (2014) 216–228
Reliable Ranging Technique based on Statistical
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
BIG DATA, CLOUD & MOBILE COMPUTING
BIG DATA, CLOUD & MOBILE COMPUTING
ARTICLE IN PRESS
an improved version of the energy aware distributed unequal clustering
This schemecan reduce the authenticating process as short as possible
This schemecan reduce the authenticating process as short as possible
SECURITY ON TAP
SECURITY ON TAP
is an application layer protocol that facilitates the exchange of
Procedia Computer Science
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
SECURITY ON TAP
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
Journal of Network and Computer Applications
ARTICLE IN PRESS
Z39.50 An Information Retrieval Protocol for Libraries
1 The framework Many educational programs were proposed and developed
3
ARTICLE IN PRESS
1 Introduction Censorship of information on the Internet has been
Vehicular Communications 4 (2016) 30–37
Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 – 08 March, 2014
CHAPTER
1
IoT Standards and Protocols An overview of protocols involved in
One of the areas of concern for people communicating over
11 Credit Card-Based Secure Online Payment*
Telecommun Syst (2013) 52:2163–2176
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
Computer Communications 74 (2016) 3–15
1
2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India
Routing Protocols in Vehicular Ad Hoc Networks: A
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications;
2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
many secure electronic payment solutions have been proposed but most
commerce In the OPELIX Project the intermediary is described as
4th IFAC Symposium on Telematics Applications
Secure Electronic Voting Protocols
DTN routing Traditional routing assumes that protocols somehow manage to
LBRR: Load Balanced Ring Routing Protocol for
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
Telecommun Syst
Information Sciences 258 (2014) 371–386
Engineering Science and Technology, an International Journal 19 (2016) 1050–1058
Accepted Manuscript
Security and privacy for storage and computation in cloud
A Survey Recent technological advances in the area of wireless
Telecommun Syst
Reliable Data Dissemination Protocol for VANET TrafÞc Safety Applications
10.2 IoT SECURITY OVERVIEW 189
Performance Evaluation of TCP over WLAN 802.11 with the Snoop
Analysis of the Blockchain Protocol in Asynchronous Networks
FutureGenerationComputerSystems89(2018)148–165
Accepted Manuscript
A Clustering Routing Protocol for Energy Balance of Wireless
A Clustering Routing Protocol for Energy Balance of Wireless
Computer Networks 79 (2015) 68–90
sensors
HindawiPublishingCorporation
ACCEPTED MANUSCRIPT
Chapter 7
7.1 Introduction
Quantum Cryptography: A Survey
STUDYING LTP AND LTD USING INTRACELLULAR RECORDING Methods for Induction
FOCUS-sitrep-33-covid-19
SUBJECT IN FOCUS: New protocol for Early Epidemiologic and Clinical Investigations for
applied
Appl. Sci. 2017, 7, 1069 15 of 22
Timestamp based Concurrency Control Concurrency Control can be implemented in
InternetofThings InternetofThings
Chapter
Terra Money:
S. Vijaya Kumar et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 11, November- 2013, pg. 139-145
درمان لاغری