default search action
Network and Communication Technologies, Volume 2
Volume 2, Number 1, 2013
- Alain Pirovano, Fabien Garcia:
A New Survey on Improving TCP Performances over Geostationary Satellite Link. 1-18 - Andrei M. Sukhov, D. Yu. Chemodanov:
The Neighborhoods Method and Virtual Polar Coordinates in Wireless Sensor Networks. 19-27 - Ahmed Benomar:
Cylindrical Dielectric Resonator Antenna for SHF Band Application. 28-33 - Pedro Sanches, Eric-Oluf Svee, Markus Bylund, Benjamin Hirsch, Magnus Boman:
Knowing Your Population: Privacy-Sensitive Mining of Massive Data. 34-51 - Morten N. Larsen, Brian Vinter:
Transparent Offloading of Computationally Demanding Operations in Microsoft .NET. 52-61 - Sanjay P. Ahuja, Bryan Moore:
State of Big Data Analysis in the Cloud. 62-68
Volume 2, Number 2, 2013
- Julie C. Ogbulezie, M. U. Onuu, J. O. Ushie, B. E. Usibe:
Propagation Models for GSM 900 and 1800 MHz for Port Harcourt and Enugu, Nigeria. 1-10 - Sanjay P. Ahuja, Bryan Moore:
A Survey of Cloud Computing and Social Networks. 11-16 - Ken Kin-Kiu Fong, Stanley Kam Sing Wong:
Exploring the Weak Links of Internet Security: A Study of WiFi Security in Hong Kong. 17-28 - Yeqing Wu, Fei Hu, Qingquan Sun, Ke Bao, Mengcheng Guo:
A Fast Raptor Codes Decoding Strategy for Real-Time Communication Systems. 29-42 - Victor Onomza Waziri, Joseph Adebayo Ojeniyi, Hakimi Danladi, Audu Isah, Abubakar S. Magaji, Muhammad Bashir Abdullahi:
Network Security in Cloud Computing with Elliptic Curve Cryptography. 43-58
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.