iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ node
جزئیات خدمات ترجمه در ترجمه تخصصی
query
web
element
[]
spectrum
energy
energy
data
nodes
node
VANET
[]
spectrum
[]
[]
mobility
Microsoft Word - Documento1
strategy
strategy
probabilistic
[]
[]
مقاله xml
[]
[]
[]
[]
xml
cluster
routing
routing
cluster
routing
nodes
mobility
cluster
routing
routing
cluster
routing
WIRELESS SENSOR NETWORK
data
node
[]
data
data
sensor
Journal of Computer Science 10 (1): 85-90, 2014
1372 IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.61,NO.3,MARCH 2012
Ad Hoc Networks xxx (2012) xxx–xxx
Ad Hoc Networks xxx (2012) xxx–xxx
Priorwork Prior workon CTPmostlyfocused onevaluatingthe performance of this protocolinstaticwireless sensor
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
WIRELESS SENSOR
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
TopDisc Algorithm The first coloring algorithm of TopDisc uses a
Suvarna Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
Computer Networks 57 (2013) 1714–1725
Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies
A Simple Algorithm for Fault-Tolerant Topology
FLSS: A Fault-Tolerant Topology Control
Graph Databases
Seema Mehla et. al. / (IJCSE) International Journal on Computer Science and Engineering
2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems
TowardsaGameTheoreticFormulationofClustering
Graph Databases
Ultra Low-Power and Noise Tolerant CMOS
Ultra Low-Power and Noise Tolerant CMOS
Computer Communications 35 (2012) 619–627
International Journal of Future Generation Communication and Networking
PART2-29000
Chapter 11
OpenDataStructures(inC++)
OpenDataStructures(inC++)
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 17
صفحه 53 تا 63
صفحه 64 تا 75
صفحه 76 تا 83
OpenDataStructures(inC++)
2.5 Communication Costs in Parallel Machines
MIT OpenCourseWare
IEEE TRANSACTIONS ON RELIABILITY, VOL. 51, NO. 2, MARCH 2002 111
Cloud Computing Although cloud computing is based on a collection
Chapter 2
Int. J. Advanced Networking and Applications 1323
2012 IEEE Workshop on Signal Processing Systems
2012 IEEE Workshop on Signal Processing Systems
2012 IEEE Workshop on Signal Processing Systems
Key Factor and Interaction for Network Performance
Available online at www.sciencedirect.com
Ali Ismail Awad
Ali Ismail Awad
A
IMPACT OF DISTRIBUTED GENERATION ON VOLTAGE
Stability Index Abstract The research of practical operation of Distributed
Comparison of Virtual Machine Scheduling Algorithms in
Available online at www.sciencedirect.com
Tree and Consistent Hashing Abstract This paper proposed a novel
Tree and Consistent Hashing Abstract This paper proposed a novel
To appear in Smart Environments: Technologies, Protocols, and Applications
Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
OpenDataStructures(inC++)
OpenDataStructures(inC++)
9. Red-Black Trees 9.2.RedBlackTree: A Simulated 2-4 Tree
9. Red-Black Trees 9.2.RedBlackTree: A Simulated 2-4 Tree
7. Random Binary Search Trees 7.3. Discussion and Exercises
7. Random Binary Search Trees 7.3. Discussion and Exercises
9. Red-Black Trees 9.2.RedBlackTree: A Simulated 2-4 Tree
Chapter9
7. Random Binary Search Trees 7.3. Discussion and Exercises
7. Random Binary Search Trees 7.3. Discussion and Exercises
7. Random Binary Search Trees 7.3. Discussion and Exercises
Chapter9
7. Random Binary Search Trees 7.3. Discussion and Exercises
7. Random Binary Search Trees 7.3. Discussion and Exercises
7. Random Binary Search Trees 7.3. Discussion and Exercises
Chapter9
7. Random Binary Search Trees 7.3. Discussion and Exercises
7. Random Binary Search Trees 7.2.Treap: A Randomized Binary Search Tree
Computer Standards & Interfaces 36 (2014) 278–287
Computer Standards & Interfaces 36 (2014) 278–287
TOPICS IN LIGHTWAVE
Journal of Network and Computer Applications 38 (2014) 185–201
W. Guo, W. Zhang / Journal of Network and Computer Applications 38 (2014) 185–201 187
task scheduling problem in cloud computing has become an active
*†
11
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
ISSN 2090-4304
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
s suitability iscaptured by the cost itincurs tosend apacket to
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
Expert Systems with Applications 39 (2012) 9150–9158
Expert Systems with Applications 39 (2012) 9150–9158
RDCLRP-Route Discovery by Cross Layer Routing
An Advanced NoP Selection Strategy for Odd-Even
Chord: A Scalable Peer-to-peer Lookup Protocol
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
Parallel Algorithms for Constructing Data Structures for Fast Multipole Methods
M-data at l . We only need compute M-data and box types
Available online at www.sciencedirect.com
Computer Networks 58 (2014) 254–283
A Software Defined Wireless Sensor Network
Vehicular Communications 1 (2014) 33–52
10th IEEE International Workshop on Wireless Local Networks WLN 2010, Denver, Colorado
10th IEEE International Workshop on Wireless Local Networks WLN 2010, Denver, Colorado
ICIAfS'12 1569626783
Author's Accepted Manuscript
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Comparative evaluation of information
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
The large volume and sophistication of cyber attacks on enterprise
Journal of Computer and System Sciences 80 (2014) 994–1007
FlexiChaP: A Reconfigurable ASIP for
Journal of Network and Computer Applications 35 (2012) 1367–1373
Expert Systems with Applications 39 (2012) 9150–9158
Expert Systems with Applications 39 (2012) 9150–9158
Ad Hoc Networks 24 (2015) 20–28
PART1-15057
PART2-15057
PART3-15057
Ad Hoc Networks 24 (2015) 20–28
VOL. 2, NO. 3, JUNE 2007 ISSN 1819-6608
Journal of Computer and System Sciences 80 (2014) 994–1007
To appear in Smart Environments: Technologies, Protocols, and Applications
Computers & Operations Research 40 (2013) 385–394
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
Evaluation of WCDMA Receiver Baseband
J.ParallelDistrib.Comput.74(2014)1789–1801
35th Annual IEEE Conference on Local Computer Networks LCN 2010, Denver, Colorado
This white paper covers failover cluster architecture and concepts for
Ad Hoc Networks xxx (2014) xxx–xxx
Impact of Node Mobility on MANET Routing
Wireless Pers Commun (2013) 73:1289–1308
Berntenis and Ebeling BMC Bioinformatics 2013, 14:361
1
I. J. Computer Network and Information Security, 2013, 10, 44-50
Performance Evaluation of Synchronous Distributed
Available online at www.sciencedirect.com
Sensors and Actuators A 185 (2012) 117– 126
Webots Reference Manual
246 5 Passive Mixer
276 5 Passive Mixer
Impact of Neighbor Awareness at the MAC Layer
Impact of Neighbor Awareness at the MAC Layer
I. J. Computer Network and Information Security, 2013, 10, 44-50
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 71
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 73
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 73
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 73
5.5. PATH MATERIALIZATION TECHNIQUES 77
5.5. PATH MATERIALIZATION TECHNIQUES 79
1
Sensors and Actuators A 185 (2012) 117– 126
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
G Model
Information Sciences 265 (2014) 23–35
Fig. 5. Operations to embed a linkage within a mesh. The blue arrow
End-host multicast communication using switch-trees protocols
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
.. no -STR,h=10%
.. no -STR,h=10%
5.3. SHORTEST PATH COMPUTATION 71
Journal of Network and Computer Applications 35 (2012) 619–632
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
1832 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER2009
Neural Process Lett
Neural Process Lett
Learning to Rank with Extreme Learning Machine
ThisarticleappearedinajournalpublishedbyElsevier. Theattached
Dynamic Data Allocation Methods in Distributed
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
we let each node gather location information and find routing
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
Modified Adhoc on Demand Routing
Transportation Research Part C 38 (2014) 73–84
Author's Accepted Manuscript
Author's Accepted Manuscript
Author's Accepted Manuscript
Author's Accepted Manuscript
1
Applied Mathematics and Computation 184 (2007) 291–299
Applied Mathematics and Computation 184 (2007) 291–299
Semester Thesis
41
Semester Thesis
Vehicular Communications 1 (2014) 33–52
Vehicular Communications 1 (2014) 33–52
J.ParallelDistrib.Comput.73(2013)570–579
problems can be characterized as being either very easy or
The Journal of China
IDN scalability can be achieved through completely decentralized topology design
1 Introduction So far in this book we have focused
Advanced Risk Analysis in
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, VOL. 44, NO. 6, NOVEMBER/DECEMBER 2008 1851
1: function Parallelize(Node n, int maxTasks)
1
LIAITHON: A location-aware multipath video
1
- - = - -' J-leJj VrH (2)
Solving the Hidden and Exposed Terminal problems Using
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012)
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
algorithm parallel
64 Chapter 3 Parallel Computers
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
Computer Communications xxx (2015) xxx–xxx
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
Chapter 11
Chapter 11
Chapter 11
248 M. Hekmatfar and M. Pishvaee
Prediction-based Routing with Packet Scheduling
Data Communication Networks
A group of wireless mobile hosts making a temporary network
Int. J. Electron. Commun. (AEÜ) 69 (2015) 432–441
Advanced Secure Routing in Ad hoc mobile
Gowri.K et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7122-7125
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 5, MAY 2013 951
ANF: A Fast and Scalable Tool for Data Mining
An Ultra-Wideband Resistive-Feedback Low-Noise Ampli�er with Noise Cancellation in
Globecom 2014 - Wireless Networking Symposium
68 S. Yan et al./Computers & Industrial Engineering 81 (2015) 65–77
68 S. Yan et al./Computers & Industrial Engineering 81 (2015) 65–77
Modern Power Systems Analysis l l
Fault Tolerant Source Routing for Network-on-chip
Fault Tolerant Source Routing for Network-on-chip
Optimization of Clustering in SPIN-C
An Ultra-Wideband Resistive-Feedback Low-Noise Ampli�er with Noise Cancellation in
Globecom 2014 - Wireless Networking Symposium
2013 IEEE 27th International Conference on Advanced Information Networking and Applications
Electronic Notes in Theoretical Computer Science 171 (2007) 57–69
A Hybrid Approach for Searching in the Semantic Web
GRAMI: Frequent Subgraph and Pattern Mining in a Single
Ad Hoc Networks 25 (2015) 38–53
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
Journal of Network and Computer Applications 35 (2012) 619–632
A surveyoncoverageandconnectivityissuesinwirelesssensornetworks
Search and Replication in
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
IEEE - 33044
Globecom 2014 - Wireless Networking Symposium
Globecom 2014 - Wireless Networking Symposium
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
A. Encryption gateway node
International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.5, October 2012
A Content-Centric Architecture
A Content-Centric Architecture
IEEETRANSACTIONSONNUCLEARSCIENCE,VOL.61,NO.6,DECEMBER2014 3265
Available online at www.sciencedirect.com
Computer Communications 44 (2014) 14–25
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
CogMesh: A Cluster-based Cognitive Radio
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2007 proceedings.
Basic Structure of GNPFigure 1 shows the basic structure
Double-Deck EGSCSUsing GNP withACO
ISSN: 2278 – 7798
FutureGenerationComputerSystems ( ) –
is a wireless network consists of large number of sensor
Wireless Sensor Network Security model using
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
A Software Architecture for Shared Resource
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing
2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control
Application of Ant Colony Optimization Algorithm to
2011 IEEE International Symposium on Information Theory Proceedings
IEEE Transactions on Power Delivery. Vol. 7, No. 3, July 1992
1487
IEEE Transactions on Power Delivery. Vol. 7, No. 3, July 1992
Web Semantics: Science, Services and Agents on the World Wide Web 8 (2010) 26–36
IEEETRANSACTIONSONSMARTGRID,VOL.4,NO.2,JUNE2013 877
2011 IEEE International Symposium on Information Theory Proceedings
ScienceDirect
ScienceDirect
WINTERS LAYOUT 8/3/06 1:29 PM Page 77
IEEETRANSACTIONSONSMARTGRID,VOL.4,NO.2,JUNE2013 877
represented Tabu search algorithm in airlines location in which each
represented Tabu search algorithm in airlines location inwhich each hub
2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems
2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
IEEETRANSACTIONSONSMARTGRID,VOL.4,NO.2,JUNE2013 877
(IJCSIS) International Journal of Computer Science and Information Security,
An Energy Aware Cellular Learning Automata Based
Int. J. Electron. Commun. (AEÜ) 69 (2015) 455–457
Journal of Information & Computational Science 9: 4 (2012) 1083–1096
Computers and Electrical Engineering xxx (2014) xxx–xxx
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
1
Design of Low Power and High Speed Ripple Carry
Communications and Network, 2010, 2, 104-112
Design of Low Power and High Speed Ripple Carry
Computer Networks 72 (2014) 45–61
Communications and Network, 2010, 2, 104-112
2.3.2 Receiving
Computer Networks 72 (2014) 45–61
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 8, OCTOBER 2011 3897
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 8, OCTOBER 2011 3897
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2011 proceedings.
1426 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 8, AUGUST 1999
Int. J. Ad Hoc and Ubiquitous Computing, Vol. x, No. x, xxxx 1
SkipTree: A Scalable Range-Queryable Distributed Data
SkipTree: A Scalable Range-Queryable Distributed Data
SkipTree: A Scalable Range-Queryable Distributed Data
Engineering Applications of Artificial Intelligence 32 (2014) 228–241
International Journal of Computational Intelligence Research
sleep mode operation
sleep node
Time Synchronization 249
Journal of Network and Computer Applications 45 (2014) 168–180
Risk Engineering
Advanced Operating Systems
Advanced Operating Systems
Expert Systems with Applications 41 (2014) 4309–4321
Engineering Applications of Artificial Intelligence 41 (2015) 195–206
Available online at www.sciencedirect.com
Expert PDF Trial Analyzing the
Short-term expansion planning of radial electrical
Trim size: 170mm x244mmCichosz c09.tex V3 - 11/04/2014 10:21 A.M. Page 279
®الگوریتم پایتون
2000 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
Hindawi Publishing Corporation
Expert PDF Trial Analyzing the
The route discovery process is initiated whenever a source node
4 Simulation Results This section compares the performance of the
The route discovery process is initiated whenever a source node
4 Simulation Results This section compares the performance of the
Available online at www.sciencedirect.com
Hindawi Publishing Corporation
Computing (2013) 95:723–738
Water Hammer: An Analysis of Plumbing Systems,
ISSN 2277-3061
1
ISSN: 2278 – 1323
Accepted Manuscript
Research Article
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 7, JULY 2011 1085
Cluster Comput (2015) 18:1157–1169
Cluster Comput (2015) 18:1157–1169
IJRRAS 10 (2) ● February 2012 www.arpapress.com/Volumes/Vol10Issue2/IJRRAS_10_2_06.pdf
An Ontology-based P2P Network for
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Expert PDF Trial Analyzing the
is an emergingtechnology and day by day it is attracting
is an emergingtechnology and day by day it is attracting
INTRODUCTION
SECURITY PROBLEMS
SECURITY PROBLEMS
SECURITY PROBLEMS
Design and Implementation of a Semantic
Design and Implementation of a Semantic
HORNET:High-speedOnionRoutingattheNetworkLayer
HORNET:High-speedOnionRoutingattheNetworkLayer
Computer Networks 57 (2013) 1714–1725
Introduction to
Introduction to
Formal Modelling and Validation of a Novel
AN ENHANCED SELF-ADAPTIVE MAPREDUCE SCHEDULING
ADHOC 1216 No. of Pages 16, Model 3G
AN ENHANCED SELF-ADAPTIVE MAPREDUCE SCHEDULING
and recover from the security attacks and also provides apseudo
and recover from the security attacks and also provides a
and recover from the security attacks and also provides a
Low Level Security Mechanisms
Information Fusion xxx (2013) xxx–xxx
Unidirectional Link Counter - A Routing Protocol
Journal of Network and Computer Applications 39 (2014) 140–151
Journal of Network and Computer Applications 57 (2015) 85–101
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Location-Dependent Key Management Protocol for
If the strike price changes over the life of the
Expert Systems with Applications 38 (2011) 306–313
Expert Systems with Applications 38 (2011) 306–313
Expert Systems with Applications 38 (2011) 306–313
D A command to display information about currently active jobs
z/OS ���
Expert Systems with Applications 38 (2011) 306–313
Wireless Pers Commun (2015) 84:2035–2053
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2013 International Conference on Advanced Electronic Systems (ICAES)
IEEE - 31661
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
Security Analysis of Reliable Transport Layer Protocols for
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
IEEE-International Conference On Advances In Engineering, Science And Management (lCAESM -2012) March 30, 31, 2012 478
Survey on Load Rebalancing For
Ad Hoc Networks 10 (2012) 1457–1468
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 0 8 8 3 4 2 0
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2013 International Conference on Advanced Electronic Systems (ICAES)
IEEE - 31661
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
Security Analysis of Reliable Transport Layer Protocols for
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
IEEE-International Conference On Advances In Engineering, Science And Management (lCAESM -2012) March 30, 31, 2012 478
International Journal of Advances in Engineering & Technology, Sept. 2013.
AN ENHANCED SELF-ADAPTIVE MAPREDUCE SCHEDULING
Hindawi Publishing Corporation
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Hindawi Publishing Corporation
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Routing in Vehicular Ad Hoc
ARTICLE IN PRESS
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
18 | Operator's manual
Globecom 2012 - Ad Hoc and Sensor Networking Symposium
2009 International Conference on Computational Intelligence and Security
44 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
A Scalable Peer-to-peer Lookup Protocol
Applied Soft Computing 38 (2016) 469–476
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 17
G Model
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Service for Internet
Chord: A Scalable Peer-to-peer Lookup Protocol
Computer Networks 74 (2014) 92–102
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Protocol
8
8
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Wireless Pers Commun
Available online at www.sciencedirect.com
Wireless Pers Commun
Available online at www.sciencedirect.com
Wireless Pers Commun
Computer Communications xxx (2014) xxx–xxx
Available online at www.sciencedirect.com
Multi-node Scheduling Algorithm
Wireless Sensor Network Protocols
Wireless Sensor Network Protocols
ComputerNetworks38(2002)393–422
Wireless Sensor Networks
1 CharacteristicsVehicular ad hoc networks can be considered as
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Computer Networks 52 (2008) 2292–2330
IET Wireless Sensor Systems
AdaptingscientificcomputingproblemstocloudsusingMapReduce
41
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
Wireless Pers Commun (2012) 63:871–894
JID:SCICO AID:1977 /FLA [m3G; v1.172; Prn:22/01/2016; 13:36] P.1 (1-16)
Chapter 15
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
Research scholar, TMU, Moradabad, INDIA JIT, Barabanki, INDIA
AdaptingscientificcomputingproblemstocloudsusingMapReduce
IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 16, NO. 4, FOURTH QUARTER 2014 1839
Journal of Network and Computer Applications 37 (2014) 216–228
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems ( ) –
Reliable Ranging Technique based on Statistical
2014 IEEE International Conference on Systems, Man, and Cybernetics
Chapter 15
a r t i c l e i n f
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
Routing in Vehicular Ad Hoc
Optimized Node Selection Process for Quality of
The connection weight between a neuron in the pattern layer
Simulation Modelling Practice and Theory 38 (2013) 69–97
Simulation Modelling Practice and Theory 38 (2013) 69–97
Dark Silicon Aware Runtime Mapping for Many-core Systems: A
372 S. Subramaniam et al./Knowledge-Based Systems 27 (2012) 369–380
3. s-XML: our proposed approach
a r t i c l e i n f
a r t i c l e i n f
CHAPTER 6
a r t i c l e i n f
S systems for VANET The examples of the previous section
الگوریتم های وب کاوی و داده کاوی
Chapter 2
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of
Downloaded form http://iranpaper.ir
Figure 2.11 and Figure 2.12 illustrates an example of how circuit-switching flow
Computer Communications 35 (2012) 670–681
Scheduling Algorithm for Real-Time Applications in Grid Environment
Computer Networks 54 (2010) 527–544
Computer Networks 54 (2010) 527–544
BIG DATA, CLOUD & MOBILE COMPUTING
BIG DATA, CLOUD & MOBILE COMPUTING
(IJCSIS) International Journal of Computer Science and Information Security,
an improved version of the energy aware distributed unequal clustering
Result Analysis
www.ietdl.org
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 497
an energy balanced clustering algorithm based on leach protocolineering and Modeling (ICSEM-13)
Falasca et al. A DS Framework to Assess SC Resilience
A Study on Local Repair Routing Algorithm based on
Practical aspects of security certification for commercial
Practical aspects of security certification for commercial
A Study on Local Repair Routing Algorithm based on
Initial Design First we describe our Content Addressable Network in
Initial Design First we describe our Content Addressable Network in
joining the party the entire CAN space is divided amongst
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
55
Hierarchical Storage Technique for Maintaining
A Survey on Wireless Sensor Network Security
Partition of a network in to different isolated regions can
ARTICLE IN PRESS
LetHealthyLinksBloom: ScalableLinkChecksin
INTEGRATION, the VLSI journal 52 (2016) 41–50
LOFT: A low-overhead fault-tolerant routing scheme for 3D NoCs
LOFT: A low-overhead fault-tolerant routing scheme for 3D NoCs
Electrical Power and Energy Systems 77 (2016) 314–326
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
A malicious node can perform packetdropping by itself or by
HPE 3PAR StoreServ Architecture
25 26 IEEE TRANSACTIO N S O N P O W ER SYSTEM S, V O L. 3 1, N O. 4 , JU L Y 201 6
IEEE ICC 2015 - Workshop on Smart Communication Protocols and Algorithms (SCPA 2015)
2. Related work and original contributions
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TC.2016.2532871, IEEE
will be utilized to deliver the packet to the destination layer
5
4.2 Dynamic Elevator Assignment (DEA)
4 9
International Journal of Computer Applications (0975 – 8887)
ABSTRACT
ABSTRACT
Distributed Fusion Architectures and
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.28, NO.1, JANUARY 2016 17
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.28, NO.1, JANUARY 2016 17
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING, VOL.28, NO.1, JANUARY 2016 17
2
Electrical Power and Energy Systems 77 (2016) 314–326
764 IEEETRANSACTIONSONSOFTWAREENGINEERING, VOL.41, NO.8, AUGUST 2015
ARTICLE IN PRESS
Electrical Power and Energy Systems 77 (2016) 314–326
Resource-aware clustering based routing protocol in
764 IEEETRANSACTIONSONSOFTWAREENGINEERING, VOL.41, NO.8, AUGUST 2015
Computers & Operations Research 75 (2016) 12–27
Computers & Operations Research 75 (2016) 12–27
Computers & Operations Research 75 (2016) 12–27
Distributed Database Management Techniques
Wireless Netw (2016) 22:723–740
Distributed Database Management Techniques
3 Coordination Algorithms
J.ParallelDistrib.Comput.97(2016)57–68
Distributed Fusion Architectures and
Distributed Fusion Architectures and
existing multicast routing algorithms for MANETs cannot be directly applied
We demonstrate the model by the example of finding a
Computer Networks 104 (2016) 55–65
star network topology to enhance the system capacity abstract In
Geographic Load Balancing Routing in Hybrid
star network topology to enhance the system capacityIn this
star network topology to enhance the system capacity In this
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
Signals and Communication Technology
Encyclopedia of Social Network Analysis and Mining, Springer 2013
Available online at www.sciencedirect.com
CoRoute: A New Cognitive Anypath Vehicular
Downloaded from http://iranpaper.ir
Journal of Network and Computer Applications
Available online at www.sciencedirect.com
Abstract Wireless Networks are becoming popular due to the concept
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Design and Implementation of Dynamic
Computer Communications 96 (2016) 1–16
Available online at www.sciencedirect.com
ANT-COLONY OPTIMIZATION BASED IN-NETWORK DATA AGGREGATION IN
Imprint logo
Distrib. Comput. (2011) 24:65–78
Downloaded from http://iranpaper.ir
cut algorithm for the strong minimum energy topology in wireless
manet spanning tree
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Transportation Research Part E 46 (2010) 1071–1085
Downloaded from http://iranpaper.ir
SplitStream: High-Bandwidth Multicast in Cooperative
SplitStream: High-Bandwidth Multicast in Cooperative
Design and Implementation of Dynamic
2105
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Conformity-aware influence maximization in online social
Conformity-aware influence maximization in online social
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSE.2016.2521379,
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSE.2016.2521379,
Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 – 08 March, 2014
6.2 Heuristic solution methods for the workforce assignment problem 149
2015 11th International Conference on Mobile Ad-hoc and Sensor Networks
is normally regarded as an important solution for detecting various
Downloaded from http://comjnl.oxfordjournals.org/ at Northeastern University Libraries on October 10, 2014
52 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 22, NO. 1, FEBRUARY 2007
Data Management and ImplementationPing LiuComputer and Information Engineering
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2016.2561303, IEEE
Brigham Young University
Cache-aware Named-data Forwarding in Internet of
Cache-aware Named-data Forwarding in Internet of
Computers and Electrical Engineering 41 (2015) 357–367
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
Available online at www.sciencedirect.com
suggesteda faster algorithm but the number of clusters must still
It starts with singlenodecommunities and repeatedly performs the merging of
in many cases the accuracy of decision trees is comparable
2015 International Conference on Computing Communication Control and Automation
1594 IEEETRANSACTIONSONCOMPUTERS, VOL.64, NO.6, JUNE 2015
Most traffic in sensor networks canbe classified into one of
Telecommun Syst (2013) 52:2163–2176
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded from http://iranpaper.ir
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
ARTICLE IN PRESS
Hindawi
106 G. Carofiglio et al. / Computer Networks 110 (2016) 104–117
A new measure of heterogeneity for complex networks
Pattern Recognition Letters 24 (2003) 1925–1933
computers & security 37 (2013) 1e14
J Ambient Intell Human Comput
J Ambient Intell Human Comput
J Ambient Intell Human Comput
www.masdoc.ir
the tree construction and link scheduling are disjoint steps in
Downloaded from http://iranpaper.ir
Available online at www.sciencedirect.com
J. Opt Res. Soc. Vol. 43, No. 5, pp. 469-481 0160-5682/92 $3.50+0.00
computers & security 37 (2013) 1e14
WANG1_LAYOUT.qxp_Layout 1 3/13/15 1:56 PM Page 6
WANG1_LAYOUT.qxp_Layout 1 3/13/15 1:56 PM Page 6
WANG1_LAYOUT.qxp_Layout 1 3/13/15 1:56 PM Page 6
A Performance Comparison of
2013 IEEE Military Communications Conference 2013 IEEE Military Communications Conference
Chapter
فیبر نوری
computers & security 37 (2013) 1e14
An Adaptive Probabilistic Scheduler for Offloading
computers & security 37 (2013) 1e14
Hindawi Publishing Corporation
Configuration
Configuration
Proceedings of IEEE CCIS2012
Proceedings of IEEE CCIS2012
Hindawi Publishing Corporation
Hindawi Publishing Corporation
Clustering Enhancement for VANETs in Highway
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications;
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
PhysicaD323–324(2016)73–79
Chapter 1
ARTICLE IN PRESS
A Distributed Algorithm to Detecting Node Replication
ComputerNetworks38(2002)393–422
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
Chapter 3
Clustering in Wireless Sensor Networks: Performance Comparison of
A Migration-enhanced Edge Computing Support for
DTN routing Traditional routing assumes that protocols somehow manage to
LBRR: Load Balanced Ring Routing Protocol for
Unicast Routing The Bundle protocol does not define any method
Unicast Routing The Bundle protocol does not define any method
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
Algorithms and Applications for Community
Algorithms and Applications for Community
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
Engineering Science and Technology, an International Journal 19 (2016) 1050–1058
C h ap t e r 6. B i g D a t a P r oc e s s i n g C on c e p t s
Accepted Manuscript
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence
An Efficient Algorithm for Community Detection
Related content
ARTICLE IN PRESS
Genetic algorithm approach for k-coverage and m-connected
Genetic algorithm approach for k-coverage and m-connected
Downloaded from http://iranpaper.ir
A Survey Recent technological advances in the area of wireless
Reliable Data Dissemination Protocol for VANET TrafÞc Safety Applications
Energy Efficient Routing in Wireless Sensor
International Conference on Computer Science and Electronic Technology (CSET 2016)
Cluster Comput
GPSR: Greedy Perimeter Stateless Routing for Wireless
Int. J. Autonomous and Adaptive Communications Systems, Vol. x, No. x, 20xx 1
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
node
An Object-Oriented Knowledge Representation
An Object-Oriented Knowledge Representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
Oriented Knowledge Representation Structure for Exploration Data Integration Knowledge representation
Accepted Manuscript
Ava ailable online att www.sciencedirect.com
Engineering Applications of Artificial Intelligence 46 (2015) 23–32
C h ap t e r 6. B i g D a t a P r oc e s s i n g C on c e p t s
Accepted Manuscript
2524 IEEE COMMUNICATIONS LETTERS, VOL. 21, NO. 11, NOVEMBER 2017
Accepted Manuscript
Computers & Industrial Engineering 64 (2013) 1096–1109
Hindawi
DHILLON AND KALRA 7of20
DHILLON AND KALRA 7of20
DHILLON AND KALRA 9of20
DHILLON AND KALRA 7of20
DHILLON AND KALRA 7of20
DHILLON AND KALRA 9of20
DHILLON AND KALRA 17 of 20
Learn ECG in a Day Learn ECG in a Day
Learn ECG in a Day Learn ECG in a Day
Learn ECG in a Day Learn ECG in a Day
Learn ECG in a Day Learn ECG in a Day
Expert Systems With Applications 115 (2019) 200–222
202 S.M.H. Bamakan et al. / Expert Systems With Applications 115 (2019) 200–222
Multi-Net: ScalableMultilayerNetworkEmbeddings
sensors
Available online at www.sciencedirect.com
Computers and Electrical Engineering 67 (2018) 96–113
A Clustering Routing Protocol for Energy Balance of Wireless
A Clustering Routing Protocol for Energy Balance of Wireless
Accepted Manuscript
Sinks Mobility Strategy in IPv6-based WSNs for
Sinks Mobility Strategy in IPv6-based WSNs for
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2016.2615296, IEEE
Downloaded from http://comjnl.oxfordjournals.org/ at West Virginia University on September 18, 2016
WirelessBodyAreaNetwork(WBAN):ASurveyonReliability,
Received September 1, 2017, accepted October 8, 2017, date of publication October 11, 2017, date of current version February 1, 2018.
Received January 18, 2018, accepted February 23, 2018, date of publication March 19, 2018, date of current version April 18, 2018.
Wireless Pers Commun (2016) 89:93–118
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TGCN.2018.2813060, IEEE
106 CHAPTER 2 Computer Clusters for Scalable Parallel Computing
106 CHAPTER 2 Computer Clusters for Scalable Parallel Computing
Guarantee IP Lookup Performance with FIB Explosion
Whale Optimization Algorithm for Routing in Internet of Things to
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16)
(IJACSA) International Journal of Advanced Computer Science and Applications,
Neurocomputing 284 (2018) 1–9
Neurocomputing 284 (2018) 1–9
HindawiPublishingCorporation
both of the real world in which we live and
both of the real world in which we live and
Journal of Network and Computer Applications 35 (2012) 619–632
Journal of Network and Computer Applications 35 (2012) 619–632
Journal of Network and Computer Applications 35 (2012) 619–632
SPECIALSECTIONONINTELLIGENTSYSTEMSFORTHEINTERNETOFTHINGS
November 29, 2019 Distributed Systems
November 29, 2019 Distributed Systems
mpi This is a parallel program using MPI to calculate
J.ParallelDistrib.Comput.72(2012)650–665
J Supercomput
Complex&IntelligentSystems
Complex&IntelligentSystems
Applied Energy 230 (2018) 1673–1684
Applied Energy 230 (2018) 1673–1684
7
Types of Network Topology Network Topology is the schematic description
Low-PowerWirelessBus
8 NETWORK OPTIMIZATION PROBLEMS WITH SIDE CONSTRAINTS All the network
The Fourteenth IEEE International Conference on e-Business Engineering
AcceptedManuscript
Abstract This paper presents a new intelligent monitoring and event
Downloaded from https://iranpaper.ir
2014 IEEE World Forum on Internet of Things (WF-IoT)
JournalPre-proof
wireless sensor networks are developing rapidly with the support of
SecureDataAggregationinWirelessSensorNetworks: ASurvey
SecureDataAggregationinWirelessSensorNetworks: ASurvey
SecureDataAggregationinWirelessSensorNetworks: ASurvey
DecentralizedAccessibilityof e-commerce Products through
DecentralizedAccessibilityof e-commerce Products through
Downloaded from https://iranpaper.ir
Trust Computational Heuristic for Social Internet of
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3092185, IEEE Internet of
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TNSM.2020.3046906, IEEE
Downloaded from https://iranpaper.ir
Computer Networks 197 (2021) 108327
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.
19.1 Introduction 493
19.1 Introduction 493
19.1 Introduction 493
Financial Econometrics, Mathematics and Statistics
Financial Econometrics, Mathematics and Statistics
AcceptedManuscript
Establishing Pairwise Keys in Distributed
FutureGenerationComputerSystems128(2022)36–44
FutureGenerationComputerSystems128(2022)36–44
FutureGenerationComputerSystems128(2022)36–44
Journal of Network and Computer Applications 207 (2022) 103478
An inappropriate corporate image may act as a burden on
S. Vijaya Kumar et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 11, November- 2013, pg. 139-145
we introduce some example problems and systems from multiple disciplines
Solving the Constrained Single-Row Facility Layout
we introduce some example problems and systems from multiple disciplines
we introduce some example problems and systems from multiple disciplines
we introduce some example problems and systems from multiple disciplines
We pay special attention to how the structure of the
The Incidence Matrix and its Applications After studying adjacency and
The Incidence Matrix and its ApplicationsAfter studying adjacency and
we introduce some example problems and systems from multiple disciplines
Expert Systems With Applications 139 (2020) 112839
Expert Systems With Applications 139 (2020) 112839
Expert Systems With Applications 210 (2022) 118477
Chapter 1
Peer-to-Peer Networking and Applications
Peer-to-Peer Networking and Applications