iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ packets
جزئیات خدمات ترجمه در ترجمه تخصصی
Microsoft Word - Documento1
WIRELESS SENSOR NETWORK
The many advantages of cloud computing are increasingly attracting individualsand
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
Firewall Policies Management: A Survey Paper
718 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
Fig
TOPICS IN LIGHTWAVE
An Advanced NoP Selection Strategy for Odd-Even
JURCA LAYOUT 5/22/07 12:51 PM Page 108
AProposedFrameworkforCalibrationofAvailable
M USHA AND K MADHANA: ANALYTICAL CHARACTERIZATION OF WLANS FOR QUALITY-OF-SERVICE WITH ACTIVE QUEUE MANAGEMENT
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
242 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 2, FEBRUARY 2014
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
Recent research shows that random linear network coding is adapted
Recent research shows that random linear network coding is adapted
The Design Philosophy of the DARPA Internet Protocols
OpenFlow: EnablingInnovationinCampusNetworks
COMPNW 5373 No. of Pages 19, Model 3G
1
Algorithms for Packet Classification
Computer Communications 33 (2010) 477–484
An efficient network intrusion detection
IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium
the Mobile IPv6 protocol incorporates a route optimization mechanism that
2013 3rd International Conference on Computer Science and Network Technology
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
CSA is diffi cult due to the dynamic nature of
7 Towards Achieving Effective Cyber Situational Awareness CSA can be
an operational use case will be outlined using the previously
an operational use case will be outlined using the previously
Data Communication Networks
Available online at www.sciencedirect.com
2015 4th MEDIAN Workshop
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
Design and Implementation of A Content-aware Switch using A Network
Low Overhead Predictability Enhancement in Non-
A Content-Centric Architecture
A Content-Centric Architecture
Des Autom Embed Syst
JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 3, MARCH 2010 211
Computer Networks 44 (2004) 643–666
Hasani
w
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Wireless Netw (2011) 17:1441–1459
The Bandwidth Adjustment in the Last Round (BA-LR) for WiMAX Network
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
1. Introduction
Out of many
COMMUNICA TIONS
COMMUNICA TIONS
COMMUNICA TIONS
COMMUNICA TIONS
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 2, SECOND QUARTER 2011 245
sleep mode operation
sleep node
Computer Networks 57 (2013) 3463–3478
HORNET:High-speedOnionRoutingattheNetworkLayer
HORNET:High-speedOnionRoutingattheNetworkLayer
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
The Journal ofSystemsand Software 110 (2015) 122–135
Security Analysis of Reliable Transport Layer Protocols for
Then the resource everyone takes for granted is a major
Security Analysis of Reliable Transport Layer Protocols for
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Computer Networks 74 (2014) 92–102
Fine-Grained Power Scaling Algorithms for Energy
Fine-Grained Power Scaling Algorithms for Energy
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Fine-Grained Power Scaling Algorithms for Energy
Fine-Grained Power Scaling Algorithms for Energy
SlideOR: Online Opportunistic Network Coding
Journal of Network and Computer Applications 39 (2014) 83–92
IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 16, NO. 4, FOURTH QUARTER 2014 1839
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
5th IEEE International Workshop on Practical Issues in Building Sensor Network Applications SenseApp 2010, Denver, Colorado
time by passively monitoring a network link over which the
Instant Wireshark Starter
From the Proceedings of the 2000 International Conference on Supercomputing, Santa Fe, N.M., May, 2000.
From the Proceedings of the 2000 International Conference on Supercomputing, Santa Fe, N.M., May, 2000.
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Computer Communications 96 (2016) 1–16
Neural Comput & Applic
Neural Comput & Applic
Downloaded form http://iranpaper.ir
Downloaded form http://iranpaper.ir
Computer Networks 73 (2014) 72–83
1
1
1
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
1
1594 IEEETRANSACTIONSONCOMPUTERS, VOL.64, NO.6, JUNE 2015
1. Over time, Ethernet evolved to support switches, routers, and multiple link
A Performance Comparison of
142 CHAPTER 6. OPTICAL ACCESS AND BROADCAST NETWORKS
ZigZagDecoding: CombatingHiddenTerminalsinWireless
ZigZagDecoding: CombatingHiddenTerminalsinWireless
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2685596, IEEE Internet of
Designing and Implementing
NMap is a free and open source utility that mainly performs IP scans, port
GPSR: Greedy Perimeter Stateless Routing for Wireless
Performance Evaluation of TCP over WLAN 802.11 with the Snoop
node
Accepted Manuscript
Accepted Manuscript
Computer Networks 146 (2018) 200–216
Received January 18, 2018, accepted February 23, 2018, date of publication March 19, 2018, date of current version April 18, 2018.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TGCN.2018.2813060, IEEE
Computer Networks 146 (2018) 200–216
(IJACSA) International Journal of Advanced Computer Science and Applications,
sensors
Design This paper presents two optimization techniques for Linux specifically
Chapter 7
7.1 Introduction
The ability to access the raw packets on a network
what they mean and how they are relevant to network
AcceptedManuscript