iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ message
جزئیات خدمات ترجمه در ترجمه تخصصی
checkpoint
nodes
Create
Create
cryptography
Journal
method
applications
message
sensor
www.hbr.org
Claude Shannon and \A Mathematical Theory of Communication"
Expert Systems
Direct marketing and channels marketing 153
Journal of Computer and System Sciences 79 (2013) 1200–1213
Journal of Computer and System Sciences 79 (2013) 1200–1213
Computer Communications 35 (2012) 619–627
METHODS Participants and Design This study was approved by the
Computer Network Security Protocols
The worm will then search all drives which are connected
2.5 Communication Costs in Parallel Machines
Print
73
23/12/2010 18:39:00
2010 Second International Conference on Network Applications, Protocols and Services
RE: Fund Release Requirement From Cater Allen Private Bank Plc
1.4 / SECURITY SERVICES 15
16 CHAPTER 1 / INTRODUCTION
1.6 / A MODEL FOR NETWORK SECURITY 19
1.4 / SECURITY SERVICES 15
16 CHAPTER 1 / INTRODUCTION
1.6 / A MODEL FOR NETWORK SECURITY 19
Hollywood is preparing a new epic film on the life
Hollywood is preparing a new epic film on the life
a minority staff report was submitted to the United States
a minority staff report was submitted to the United States
a minority staff report was submitted to the United States
RDCLRP-Route Discovery by Cross Layer Routing
Future Generation Computer Systems
A robust chaotic algorithm for digital image steganography a b
Commun Nonlinear Sci Numer Simulat 19 (2014) 1898–1907
his material is an introduction to corporate finance
A robust chaotic algorithm for digital image steganography a b
Comparative evaluation of information
Mobile Marketing Strategies for Permission-based Communication:
Journal of Computer and System Sciences 80 (2014) 994–1007
Available online at www.sciencedirect.com
PART3-15057
International Journal of the Physical Sciences Vol. 6(21), pp. 5051-5053, 30 September, 2011
Journal of Computer and System Sciences 80 (2014) 994–1007
3586 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.60,NO.8,OCTOBER 2011
Authentication
greetingfolder Specifies the folder in which to save the voicemail
J. Shanghai Jiaotong Univ. (Sci.), 2014, 19(4): 466-475
Computer Communications 35 (2012) 188–195
2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control 2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control
Understanding
Understanding
system allows a center to send encrypted messages over a
system allows a center to send encrypted messages over a
SALTZER ET AL. End-to-End Arguments in System Design 1
PRIMATEs v1
ScienceofComputerProgramming78(2013)2360–2380
Wireless PersCommun(2014)78:247–269
Many producers can send messages that go to one queue
Many producers can send messages that go to one queue
Many producers can send messages that go to one queue
Many producers can send messages that go to one queue
Optimistic Recovery in Multi-threaded Distributed Systems
rules
A Short Survey on Image Steganography and
International Journal of Advanced Science and Technology
A Delay-Tolerant Network Architecture for Challenged
Messaging Default SIM settings Mobile Data Location Mode Recent location
Messaging Default SIM settings Mobile Data Location Mode Recent location
UNICOM China_Mobile China Mobile China_Unicom China Unicom China_Telecom China Telecom
Messaging Default SIM settings Mobile Data Location Mode Recent location
Mobile Phone
Mobile Phone
SALTZER ET AL. End-to-End Arguments in System Design 1
9
Prediction-based Routing with Packet Scheduling
security and privacy protection is an important issue that needs
Secure RFID Authentication Protocol with Key
Fault Tolerant Source Routing for Network-on-chip
Fault Tolerant Source Routing for Network-on-chip
This article was downloaded by:[Atiquzzaman, Mohammed]
Electronic Notes in Theoretical Computer Science 171 (2007) 57–69
TCP/IP Tutorial and
Accepted Manuscript
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
LDPC Codes – a brief Tutorial
TinyOS – An Operating System for Tiny Embedded Networked Sensors
TinyOS – An Operating System for Tiny Embedded Networked Sensors
A Software Architecture for Shared Resource
2011 IEEE International Symposium on Information Theory Proceedings
In such a translation one is concerned with such correspondences
In such a translation one is concerned with such correspondences
In such a translation one is concerned with such correspondences
Swim teacher in UAE denies touching pupils in lesson A
6. The effectors discard the output messages (referring to output
150 IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.4, April 2012
April 2012 An Efficient Distributed Deadlock Detection and Prevention Algorithm
April 2012 An Efficient Distributed Deadlock Detection and Prevention Algorithm
2011 IEEE International Symposium on Information Theory Proceedings
Accepted Manuscript
PGP provides a confidentiality and authentication service that can be
PGP provides a confidentiality and authentication service that can be
asignature is generated for the plaintext message and prepended
3 Cryptographic Keys and Key Rings PGP makes use of
3 Cryptographic Keys and Key RingsPGP makes use of
ScienceDirect
ScienceDirect
Hello,
Computers and Electrical Engineering xxx (2014) xxx–xxx
Cognitive Learning Cognitive learning encompasses all the mental activities of
Vehicular Communications 1 (2014) 214–225
رگسح هکبش رد یزاجم تارقف نوتس تخاس یارب یژرنا زا هاگآ هدش عیزوت متیروگلا کی
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2011 proceedings.
A Sesure Image Steganography
Time Synchronization 249
END ARGUMENTS IN SYSTEM DESIGN This paper presents a design
Cognitive predictors of consumers’ intention to comply with social
4.
17_053423 st09.qxp 3/1/07 9:17 PM Page 593
organized by the newspaper La Verdad by the coffee company
48 CHAPTER 2 / CLASSICAL ENCRYPTION TECHNIQUES
48 CHAPTER 2 / CLASSICAL ENCRYPTION TECHNIQUES
CHAPTER
CHAPTER
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Unidirectional Link Counter - A Routing Protocol
D A command to display information about currently active jobs
Wireless Pers Commun (2015) 84:2035–2053
IEEE - 31661
Security Analysis of Reliable Transport Layer Protocols for
The 23rd International Technical Conference on Circuits/Systems,
IEEE - 31661
Security Analysis of Reliable Transport Layer Protocols for
Optimistic Recovery in Multi-threaded Distributed Systems
Overview Since people have been succeeded in making connections among
M18_STAL6329_06_SE_C18.QXD 2/22/08 8:45 PM Page 18-1
M18_STAL6329_06_SE_C18.QXD 2/22/08 8:45 PM Page 18-1
Globecom 2012 - Ad Hoc and Sensor Networking Symposium
Nonstandard Maintenance
www.it-ebooks.info ZeroMQ
Practical Implementation of a Secure Email
Practical Implementation of a Secure Email
PSRB4_proof ■ 14 January 2016 ■ 1/8
JID:VEHCOM AID:19 /REV [m5G; v 1.137; Prn:24/09/2014; 11:59] P.1 (1-12)
Digital Watermarking
ChahkandiPDF
2011 International Conference on Intelligence Science and Information Engineering
�
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
Less is more It is a simple rule but one
Available online at www.sciencedirect.com
The Journal of Systems and Software 43 (1998) 11–17
The Journal of Systems and Software 43 (1998) 11–17
Understanding Cryptography Christof Paar · Jan Pelzl
Understanding Cryptography Christof Paar · Jan Pelzl
MESSAGE PROCESSING AND THE
Users need automated tools to help manage such configurations that
Middle-East Journal of Scientific Research 23 (7): 1450-1460, 2015
Users need automated tools to help manage such configurations that
Users need automated tools to help manage such configurations that
Security Comes to SNMP: The New
SECURITY ON TAP
SECURITY ON TAP
jpg Telegram is known to be the only app that
jpg Telegram is known to be the only app that
The Journal of Systems and Software 43 (1998) 11–17
joining the party the entire CAN space is divided amongst
www.comsoc.org/pubs/ surveys
ALE: AES-Based Lightweight Authenticated
Partition of a network in to different isolated regions can
SECURITY ON TAP
4 Easy and Effective Email Marketing Tips for Your Small Business
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
An Introduction to Information Theory
This page intentionally left blank DISTRIBUTED SYSTEMS
which confuses the issue of which messaging system an application
which confuses the issue of which messaging system an application
AN IMPROVED LEADER ELECTION ALGORITHM FOR DISTRIBUTED SYSTEMS ABSTRACT Leader
Wireless Netw (2016) 22:2189–2201
Wireless Netw (2016) 22:723–740
Top Signs Your Brand Strategy Is Losing Focus As a
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
ARTICLE IN PRESS
work Communication SKILLS A resource commissioned by the Making Practice
Distrib. Comput. (2011) 24:65–78
ARTICLE IN PRESS
Lookup Interface
Please purchase 'e-PDF Converter and Creator' on http://www.e-pdfconverter.com to remove this message.
Vehicular Communications 4 (2016) 30–37
messages. Detach Transmit, Activation Transmit, and
Journal of Network and Computer Applications 52 (2015) 79–89
Logical clocks
Logical clocks
CHAPTER
Soc. Netw. Anal. Min. (2014) 4:189
every process pkeeps track of its communication with every other
t look up from to engage in a healthy conversation
ELERAP 607 No. of Pages 10, Model 5G
11 Credit Card-Based Secure Online Payment*
5. Sign up for their own free e-mail service, and then
Distributed Systems
handshaking
A Primer on Multichannel Marketing Multichannel marketing is the practice
A Primer on Multichannel Marketing Multichannel marketing is the practice
handshaking
How Marketers Can Win With Facebook Do you use Facebook
A new mobility-based clustering algorithm for
Lookup Interface
Lookup Interface
Lookup Interface
Lookup Interface
"And the Rest Writes Itself":
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Lookup Interface
ATTITUDE CHANGE AND
UNIVERSIDADE FEDERAL DO RIO GRANDE DO SUL
International Journal of Computer Applications (0975 – 8887)
مسیریابی (Routing) در شبکه های تاخیر پذیر (VDTN)
Unicast Routing The Bundle protocol does not define any method
Unicast Routing The Bundle protocol does not define any method
Chapter 6
Chapter 6
Accepted Manuscript
General Description
General Description
General Description
Covert Marketing Strategy and Techniques
A Brief Introduction to Cryptography
Reliable Data Dissemination Protocol for VANET TrafÞc Safety Applications
DISTRIBUTED SYSTEMS
DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /LimitAccess /Source:f:\sources\sxs
DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /LimitAccess /Source:f:\sources\sxs
Downloaded from http://iranpaper.ir
معماری کامپیوتر
چطور امواج ذهنی بفرستیم
TECH 3356
Tech 3356 AMWA EBU Spec. v1.3.1 FIMS Media SOA Framework Version 1.3.1
SPECIFICATION OF THE FIMS MEDIA SOA FRAMEWORK
SPECIFICATION OF THE FIMS MEDIA SOA FRAMEWORK
[Type here]
Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures
The value of brand loyalty Loyal customers are an important
DHILLON AND KALRA 7of20
DHILLON AND KALRA 7of20
DHILLON AND KALRA 9of20
DHILLON AND KALRA 7of20
DHILLON AND KALRA 7of20
DHILLON AND KALRA 9of20
DHILLON AND KALRA 17 of 20
The three M's of taglines: Meaningful, motivating, and
The three M's of taglines: Meaningful, motivating, and
Katz
Previous research in the area of SMS security can be
Previous research in the area of SMS security can be
Based on the results of our analysis on how SMS
Concatenated SMS Messages Concatenation provides the means to compose SMS
perceived
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
December 1, 2019 Distributed Systems
Distributed
J.ParallelDistrib.Comput.72(2012)650–665
Appl. Sci. 2017, 7, 1069 5of22
Appl. Sci. 2017, 7, 1069 5of22
Appl. Sci. 2017, 7, 1069 11 of 22
Received February 23, 2020, accepted March 11, 2020, date of publication March 25, 2020, date of current version April 9, 2020.
The first line tells you that the source code is
CRYPTOGRAPHY AND
International Journal of Scientific & Engineering Research, Volume 5, Issue 8,August-2014 348
Received July 27, 2021, accepted August 9, 2021, date of publication August 11, 2021, date of current version August 19, 2021.
Chapter 2
Peer-to-Peer Networking and Applications
Peer-to-Peer Networking and Applications