Artigo de Revisão
SIMULATION BASED ANALYSIS FOR QUALITY OF SERVICE OF 802.16 BASED MESH NETWORKS
A SHORT SURVEY OF DATA COMPRESSION TECHNIQUES FOR COLUMN ORIENTED DATABASES
THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY
WEIGHTED INTUITIONISTIC FUZZY DELPHI METHOD
PERFORMANCE ANALYSIS OF WIRELESS LANs USING DISTRIBUTED COORDINATED FUNCTION
CLOUD COVERAGE IDENTIFICATION USING SATELLITE DATA AND K-MEAN CLUSTERING ALGORITHM
Artigo de Pesquisa
AN EFFICIENT MODEL FOR PROVIDING SECURITY IN CLOUD COMPUTING ENVIRONMENT
INVISIBLE WATERMARKING USING K-HARRIES AFFINE POINT DETECTION ALGORITHIM
A SECURITY FRAMEWORK FOR WIRELESS SENSOR NETWORKS
MAINTAINING CLIENT CONNECTIVITY AND ZERO FAILOVER USING ORACLE DATAGUARD GRID COMPUTING
SEGMENTATION OF RADIOGRAPHIC IMAGES OF WELD DEFECT
ENERGY SAVING THROUGH TOPOLOGY CONTROLLED PROTOCOLS IN WSN
Veja mais