iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ packet
جزئیات خدمات ترجمه در ترجمه تخصصی
rttn
energy
routing
routing
Microsoft Word - Documento1
routing
cluster
routing
routing
cluster
routing
Priorwork Prior workon CTPmostlyfocused onevaluatingthe performance of this protocolinstaticwireless sensor
124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 1, JANUARY 2014
Key Factor and Interaction for Network Performance
10/12/2012
Scalable Packet Classification
Network Firewalls
Firewall Policy Modeling, Analysis and
Firewall Policy Modeling, Analysis and
Network Firewalls
718 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Network Firewalls
Network Firewalls
PIC-et Radio II: How to Receive AX.25 UI Frames Using Inexpensive PIC Microcontrollers
PIC-et Radio: How to Send AX.25 UI Frames Using Inexpensive PIC Microprocessors
PIC-et Radio: How to Send AX.25 UI Frames Using Inexpensive PIC Microprocessors
FutureGenerationComputerSystems29(2013)1838–1850
TOPICS IN LIGHTWAVE
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
An Advanced NoP Selection Strategy for Odd-Even
Available online at www.sciencedirect.com
Vehicular Communications 1 (2014) 33–52
Wireless Pers Commun (2014) 74:585–599
M USHA AND K MADHANA: ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT
An Illustrated Guide to IPsec IPsec is a suite of
7/26/2001 Page 5
Toward Comprehensive Traffic Generation
Computers and Electrical Engineering xxx (2014) xxx–xxx
Computers and Electrical Engineering xxx (2014) xxx–xxx
Wireless Pers Commun (2013) 73:1289–1308
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
High-Performance Packet Classification on GPU
Performance Evaluation of Synchronous Distributed
242 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 2, FEBRUARY 2014
640 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 51, NO. 11, NOVEMBER 2004
640 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 51, NO. 11, NOVEMBER 2004
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
System Name The operating system for which the disc is
System Name The operating system for which the disc is
System Name The operating system for which the disc is
Recent research shows that random linear network coding is adapted
Recent research shows that random linear network coding is adapted
The Design Philosophy of the DARPA Internet Protocols
System Name The operating system for which the disc is
OTN switching
COMPNW 5373 No. of Pages 19, Model 3G
1
1
Algorithms for Packet Classification
Vehicular Communications 1 (2014) 33–52
Vehicular Communications 1 (2014) 33–52
Computer Communications 33 (2010) 477–484
An efficient network intrusion detection
High-PerformanceHardwareMonitorstoProtectNetwork
The Journal of China
High Throughput Path Selection For Multi-Path
1
Traffic Information Based Power Saving Mechanism
2013 3rd International Conference on Computer Science and Network Technology
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
Data Communication Networks
The requirement for advanced security equipment to scan data streams for
The requirement for advanced security equipment to scan data streams for
NamedDataNetworking
A group of wireless mobile hosts making a temporary network
Fault Tolerant Source Routing for Network-on-chip
Fault Tolerant Source Routing for Network-on-chip
Journal of Systems Architecture 59 (2013) 693–708
2015 4th MEDIAN Workshop
Performance Evaluation of Routing Protocols for
Computer Communications 32 (2009) 511–521
SEC. 8.1 MULTIPROCESSORS 539
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
Design and Implementation of A Content-aware Switch using A Network
Low Overhead Predictability Enhancement in Non-
COMPNW 5477 No. of Pages 22, Model 3G
This regular paper was presented as part of the main
This regular paper was presented as part of the main
This regular paper was presented as part of the main
A Content-Centric Architecture
A Content-Centric Architecture
TinyOS – An Operating System for Tiny Embedded Networked Sensors
TinyOS – An Operating System for Tiny Embedded Networked Sensors
Des Autom Embed Syst
IEEE WCNC'14 Track 3 (Mobile and Wireless Networks)
A Survey on Deep Packet Inspection for Intrusion Detection Systems
Computer Communications 56 (2015) 60–73
Hasani
w
An Energy Aware Cellular Learning Automata Based
233
1
Communications and Network, 2010, 2, 104-112
Communications and Network, 2010, 2, 104-112
Wireless Netw (2011) 17:1441–1459
The Bandwidth Adjustment in the Last Round (BA-LR) for WiMAX Network
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Vehicular Communications 1 (2014) 214–225
ForwardingMetamorphosis: FastProgrammable
This paper aims to overcomes two limitations in current switching
Time Synchronization 249
way prefix tree data structure for strings matching We propose
way prefix tree data structure for strings matching We propose
way prefix tree data structure for strings matching We propose
The route discovery process is initiated whenever a source node
The route discovery process is initiated whenever a source node
Computer Networks 57 (2013) 3463–3478
netflow
HORNET:High-speedOnionRoutingattheNetworkLayer
HORNET:High-speedOnionRoutingattheNetworkLayer
Formal Modelling and Validation of a Novel
Low Level Security Mechanisms
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
The Journal ofSystemsand Software 110 (2015) 122–135
Data Link Layer Security Protocols in Wireless
Data Link Layer Security Protocols in Wireless
Int. J. Electron. Commun. (AEÜ) 68 (2014) 623–630
TCP/IP Header Classification for Detecting Spoofed
A Comparative Analysis of TCP Tahoe, Reno,
Wireless Pers Commun
Wireless Pers Commun
Wireless Pers Commun
ICCCCT-10
SlideOR: Online Opportunistic Network Coding
Software Defined Networks This page is intentionally left blank Software Defined Networks
JID:SCICO AID:1977 /FLA [m3G; v1.172; Prn:22/01/2016; 13:36] P.1 (1-16)
JID:VEHCOM AID:19 /REV [m5G; v 1.137; Prn:24/09/2014; 11:59] P.1 (1-12)
Journal of Network and Computer Applications 39 (2014) 83–92
Accepted Manuscript
Accepted Manuscript
Journal of Network and Computer Applications 37 (2014) 216–228
a r t i c l e i n f
Analysis and Implementation of Packet
2010 International Conference on High Performance Switching and Routing
1
Simulation Modelling Practice and Theory 38 (2013) 69–97
Simulation Modelling Practice and Theory 38 (2013) 69–97
a r t i c l e i n f
a r t i c l e i n f
An introduction of LTE network
a r t i c l e i n f
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Chapter 2
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Figure 2.11 and Figure 2.12 illustrates an example of how circuit-switching flow
Downloaded form http://iranpaper.ir
Computer Communications 35 (2012) 670–681
Result Analysis
www.ietdl.org
2015 18th International Conference on Intelligence in Next Generation Networks
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
5th IEEE International Workshop on Practical Issues in Building Sensor Network Applications SenseApp 2010, Denver, Colorado
time by passively monitoring a network link over which the
Instant Wireshark Starter